Key establishment protocols form one of the most basic types of cryptographic protocols and have been studied intensively for over 20 years. The current status of design and analysis methods is reviewed with particular reference to formal appoaches. Likely future trends and open issues are also discussed. © Springer-Verlag 2004.
CITATION STYLE
Boyd, C. (2004). Design of secure key establishment protocols: Successes, failures and prospects. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3348, 1–13. https://doi.org/10.1007/978-3-540-30556-9_1
Mendeley helps you to discover research relevant for your work.