|
Cite as: Tin, Y.S.T., Boyd, C. and Nieto, J.G. (2003). Provably Secure Key Exchange: an Engineering Approach. In Proc. First Australasian Information Security Workshop (AISW2003), Adelaide, Australia. CRPIT, 21. Johnson, C., Montague, P. and Steketee, C., Eds. ACS. 97-104. |
(from crpit.com) (local if available) |