Potential weaknesses of AuthA password-authenticated key agreement protocols

  • Authors:
  • Kyung-Ah Shim

  • Affiliations:
  • Department of Mathematics, Ewha Womans University, 11-1 Daehyun-dong, Seodaemun-gu, Seoul, 120-750, Republic of Korea

  • Venue:
  • Computer Standards & Interfaces
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract