Inproceedings,

Security Weakness in Ren et al.'s Group Key Agreement Scheme Built on Secure Two-Party Protocols.

, , and .
WISA, volume 3786 of Lecture Notes in Computer Science, page 1-9. Springer, (2005)

Meta data

Tags

Users

  • @dblp

Comments and Reviews