Abstract
Typically, secure channels are constructed from an authenticated key exchange (AKE) protocol, which authenticates the communicating parties based on l......
小提示:本篇文献需要登录阅读全文,点击跳转登录