Password-based user authentication and key distribution protocols for client-server applications
Overview of Key Establishment Techniques: Key Distribution, Key Agreement and PKI Wade Trappe.
1 IC3 - Network Security M.Sc. in Information Security Royal Holloway, University of London.
Overview of Key Establishment Techniques: Key Distribution, Key Agreement and PKI