›› 2014, Vol. 14 ›› Issue (3): 0-0.

    Next Articles

Identity-based Encryption Authenticated Key Agreement Protocol

YUAN Yan-xiang%YOU Lin   

  • Online:2014-03-15

Abstract: The Internet of Things%identity-based encryption%authenticated key agreement