The Security analysis of Self-certified public key based Key agreement protocols against Active Attacks
Vol. 30, No. 1, pp. 25-34, Jan. 2005
Abstract
Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.
|
Cite this article
[IEEE Style]
H. Yang, "The Security analysis of Self-certified public key based Key agreement protocols against Active Attacks," The Journal of Korean Institute of Communications and Information Sciences, vol. 30, no. 1, pp. 25-34, 2005. DOI: .
[ACM Style]
HyungKyu Yang. 2005. The Security analysis of Self-certified public key based Key agreement protocols against Active Attacks. The Journal of Korean Institute of Communications and Information Sciences, 30, 1, (2005), 25-34. DOI: .
[KICS Style]
HyungKyu Yang, "The Security analysis of Self-certified public key based Key agreement protocols against Active Attacks," The Journal of Korean Institute of Communications and Information Sciences, vol. 30, no. 1, pp. 25-34, 1. 2005.