Sciweavers

ICISC
1998
99views Cryptology» more  ICISC 1998»
13 years 6 months ago
Public key protocols for wireless communications
Abstract. Protocols for authentication and key establishment have special requirements in a wireless environment. In the next generation of wireless systems it is likely that publi...
Colin Boyd, DongGook Park