LR-AKELeakage-Resilient Authenticated Key Establishment
References in periodicals archive ?
While the local authentication system shows similar results with the LMAM system, on the contrary LR-AKE system consumes long time on negotiation between HAAA and LAAA server.
Yingjie Wang, Wei Luo, and Changxiang Shen, "Analysis on Imai-Shin's LR-AKE protocol for wireless network security," Communications in Computer and Information Science, pp.
Calculation Costs of LR-AKE System Item MR HAAA LAAA AR Home -- -- -- -- registration procedure First [C.