![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Author: Teo Joseph Chee Ming Tan Chik How Ng Jim Mee
Publisher: Inderscience Publishers
ISSN: 1747-8405
Source: International Journal of Security and Networks, Vol.1, Iss.3-4, 2006-12, pp. : 226-236
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
By Ansari Junaid Riihijarvi Janne Mahonen Petri Haapola Jussi
International Journal of Sensor Networks, Vol. 2, Iss. 5-6, 2007-07 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
An Attack on the Zhou-Fan-Li Authenticated Multiple-Key Agreement Protocol
By Zhong Sheng
Cryptologia, Vol. 31, Iss. 4, 2007-10 ,pp. :