摘要: In this paper,the running modes of the two-party cryptographic protocols are used to analyze the two authentication and key agreenment protocols,and attack on the protocols is discovered. Finally,two improved protocols are given.
No related articles found! |
|