7 results on '"Li, Zhoujun"'
Search Results
2. Automatically Constructing Counter-Examples of Security Protocols Based on the Extended Horn Logic Model
3. Affiliation-Hiding Authenticated Asymmetric Group Key Agreement.
4. ID Repetition in Structured P2P Networks.
5. An efficient dynamic authenticated key exchange protocol with selectable identities
6. Authenticated key exchange protocol with selectable identities.
7. fficient and Provably Secure Generic Construction of Client-to-Client Password-Based Key Exchange Protocol.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.