A Chronological Review of Key Establishment Models and Protocols

EYY Yap, JJ Chin, A Goh

Research output: Contribution to journalArticlepeer-review

Original languageEnglish
Pages (from-to)39-61
Number of pages0
JournalMalaysian Journal of Mathematical Sciences
Volume15
Issue number0
Publication statusPublished - 2021

Keywords

  • security models
  • Bellare-Rogaway
  • Canetti-Krawczyk
  • authenticated key exchange
  • protocols
  • review

Cite this