Security Protocols

Lecture Notes in Computer Science(2002)

引用 0|浏览0
暂无评分
摘要
This paper discusses “weak authentication” techniques to provide cryptographically strong authentication between previously unknown parties without relying on trusted third parties.
更多
查看译文
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要