Report copyright - Secret-Key Authentication Beyond the Challenge-Response ...tessaro/papers/auth.pdf · Secret-key authentication. Theoretical research on authentication protocols has been initially
Please pass captcha verification before submit form