Fingerprint
Dive into the research topics of 'Security weakness in Ren et al.'s group key agreement scheme built on secure two-party protocols'. Together they form a unique fingerprint.- Sort by
- Weight
- Alphabetically
Junghyun Nam, Seungjoo Kim, Dongho Won
Research output: Chapter in Book/Report/Conference proceeding › Conference contribution