Computer Science ›› 2008, Vol. 35 ›› Issue (1): 77-79.

Previous Articles     Next Articles

CUI Guo-Hua ZHENG Ming-Hui SU Li (School of Computer Science, Huazhong University of Science & Technology, Wuhan 430074)   

  • Online:2018-11-16 Published:2018-11-16

Abstract: A non-authenticated group key agreement protocol cannot provide participant and message authentication, thus it must depend on an authenticated network channel or use another scheme to provide authentication. This paper indicates that Burrnester et al. 's

Key words: Key management, Group key agreement, Discrete logarithm problem, Interrupted attack

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!