"Authenticated key exchange protocol using neural cryptography with secret ..."

Ahmed M. Allam, Hazem M. Abbas, M. Watheq El-Kharashi (2013)

Details and statistics

DOI: 10.1109/IJCNN.2013.6707125

access: closed

type: Conference or Workshop Paper

metadata version: 2017-06-15

a service of  Schloss Dagstuhl - Leibniz Center for Informatics