Security weakness in Ren et al.'s group key agreement scheme built on secure two-party protocols

Junghyun Nam, Seungjoo Kim, Dongho Won

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Fingerprint

Dive into the research topics of 'Security weakness in Ren et al.'s group key agreement scheme built on secure two-party protocols'. Together they form a unique fingerprint.

Computer Science

Keyphrases