Course
Mobile Computing
The Diffie-Hellman Algorithm. Overview Introduction Implementation Example Applications Conclusion.
Ch 30
Mobile computing
man in the middle
Weak Keys in Diffie- Hellman Protocol Aniket Kate Prajakta Kalekar Deepti Agrawal Under the Guidance of Prof. Bernard Menezes.
A One Round Protocol for Tripartite Diffie Hellman By Dane Vanden Berg.
13_02_0586_0594
Simple password-based key agreement protocol
COEN 351 E-Commerce Security Essentials of Cryptography.
Key Agreement