Making Password Authenticated Key Exchange Suitable for Resource-Constrained Industrial Control Devices.
, and .
CHES, volume 10529 of Lecture Notes in Computer Science, page 346-364. Springer, (2017)

  • @dblp
This publication has not been reviewed yet.

rating distribution
average user rating0.0 out of 5.0 based on 0 reviews
    Please log in to take part in the discussion (add own reviews or comments).