Security Consideration. As mentioned in Introduction, we compare those admired security criteria with the previous schemes [24, 25] and show the result in Table 1.
Appears in 2 contracts
Sources: Authenticated Key Agreement Scheme, Authenticated Key Agreement Scheme