Security Weakness in Ren et al.’s Group Key Agreement Scheme Built on Secure Two-Party Protocols
2015 ◽
Vol 14
(10)
◽
pp. 5552-5564
◽
Keyword(s):
Keyword(s):
Keyword(s):
Keyword(s):