@dblp

Making Password Authenticated Key Exchange Suitable for Resource-Constrained Industrial Control Devices.

, and . CHES, volume 10529 of Lecture Notes in Computer Science, page 346-364. Springer, (2017)

Links and resources

Tags