Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
10340389 | Computer Standards & Interfaces | 2005 | 4 Pages |
Abstract
In this paper, we consider the security of two recently proposed anonymous conference key distribution schemes. We show that neither scheme is as practical as the authors' claim, and that, in certain circumstances, both schemes also suffer from security vulnerabilities. We also show that the attack described in one paper is invalid.
Keywords
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Qiang Tang, Chris J. Mitchell,