Historic look at design principles and requirements for a practical key management communication protocol. Refinement of terms, threat environment and limitations, and necessary features. Dynamic computational time and network round-trip time are well integrated with protocol specification. First use of anti-clogging tokens to defend against resource attacks.
CITATION STYLE
Simpson, W. A. (2000). Photuris: Design criteria. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1758, pp. 226–241). Springer Verlag. https://doi.org/10.1007/3-540-46513-8_17
Mendeley helps you to discover research relevant for your work.