Return to Article Details
Password-based authentication and key distribution protocols with perfect forward secrecy
Download
Download PDF