CISC   2005 Information Security and Cryptology
Wall of Fame | Most Viewed CISC-2005 Paper
169views Cryptology» more  CISC 2005»
14 years 6 hour ago
On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography
Abstract. Despite many good (secure) key agreement protocols based on publickey cryptography exist, secure associations between two wireless devices are often established using sym...
Serge Vaudenay
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
1Download preprint from source169
2Download preprint from source129
3Download preprint from source120
4Download preprint from source116
5Download preprint from source109
6Download preprint from source107