Sciweavers

SPW
2004
Springer
14 years 6 months ago
Authentication Components: Engineering Experiences and Guidelines
abstract February 6, 2004 Security protocols typically employ an authentication phase followed by a protected data exchange. In some cases, such TLS, these two phases are tightly ...
Pasi Eronen, Jari Arkko