|
Volumn 1, Issue 3, 1997, Pages 87-89
|
An authentication protocol without trusted third party
|
Author keywords
Authentication protocol; ID based scheme
|
Indexed keywords
COMPUTATIONAL COMPLEXITY;
CRYPTOGRAPHY;
FUNCTIONS;
NETWORK PROTOCOLS;
SECURITY OF DATA;
AUTHENTICATION PROTOCOLS;
EXTENDED IDENTITY (EID);
DATA COMMUNICATION SYSTEMS;
|
EID: 0031143361
PISSN: 10897798
EISSN: None
Source Type: Journal
DOI: 10.1109/4234.585805 Document Type: Article |
Times cited : (27)
|
References (4)
|