Article ID Journal Published Year Pages File Type
10340389 Computer Standards & Interfaces 2005 4 Pages PDF
Abstract
In this paper, we consider the security of two recently proposed anonymous conference key distribution schemes. We show that neither scheme is as practical as the authors' claim, and that, in certain circumstances, both schemes also suffer from security vulnerabilities. We also show that the attack described in one paper is invalid.
Related Topics
Physical Sciences and Engineering Computer Science Computer Networks and Communications
Authors
, ,