Weakness in a User Identification Scheme with Key Distribution Preserving User Anonymity

Author(s):  
Taek-Youn Youn ◽  
Jongsung Kim
1995 ◽  
Vol 3 (4) ◽  
pp. 309-322 ◽  
Author(s):  
C. Blundo ◽  
Luiz A. Frota Mattos ◽  
D. R. Stinson

Sign in / Sign up

Export Citation Format

Share Document