Authenticated key exchange protocols are at the core of Internet security protocols: they authenticate one or more of the parties communicating, and provide the establishment of a session key that is then used to encrypt application data. There are several protocols in widespread use to secure various applications. The most prominent are the following.
CITATION STYLE
Boyd, C., Mathuria, A., & Stebila, D. (2020). Transport Layer Security Protocol. In Information Security and Cryptography (pp. 241–288). Springer International Publishing. https://doi.org/10.1007/978-3-662-58146-9_6
Mendeley helps you to discover research relevant for your work.