搜索结果: 1-2 共查到“军事学 Conference key distribution”相关记录2条 . 查询时间(0.078 秒)
A Weakness in Jung-Paeng-Kim's ID-based Conference Key Distribution Scheme
Conference key distribution active attack colluding adversaries
2009/3/31
Very recently, Jung, Paeng and Kim [IEEE Communications Letters, Vol
8, No 7, pp 446{448, July 2004] have demonstrated the insecurity of Xu and Tilborg's
ID-based conference key distribution scheme,...
Cryptanalysis of an anonymous wireless authentication and conference key distribution
Cryptanalysis anonymous wireless authentication conference key distribution
2009/1/16
In this paper we analyse an anonymous wireless authentication and con-
ference key distribution scheme which is also designed to provide mobile
participants with user identification privacy during t...