"Key establishment schemes against storage-bounded adversaries in wireless ..."

Shi-Chun Tsai, Wen-Guey Tzeng, Kun-Yi Zhou (2009)

Details and statistics

DOI: 10.1109/TWC.2009.081048

access: closed

type: Journal Article

metadata version: 2020-09-06

a service of  Schloss Dagstuhl - Leibniz Center for Informatics