Design of secure key establishment protocols: Successes, failures and prospects

0Citations
Citations of this article
20Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Key establishment protocols form one of the most basic types of cryptographic protocols and have been studied intensively for over 20 years. The current status of design and analysis methods is reviewed with particular reference to formal appoaches. Likely future trends and open issues are also discussed. © Springer-Verlag 2004.

Cite

CITATION STYLE

APA

Boyd, C. (2004). Design of secure key establishment protocols: Successes, failures and prospects. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3348, 1–13. https://doi.org/10.1007/978-3-540-30556-9_1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free