Efficient Network Authentication Protocols: Lower Bounds and Optimal Implementations

Li Gong. Efficient Network Authentication Protocols: Lower Bounds and Optimal Implementations. Distributed Computing, 9(3):131-145, 1995.

Abstract

Abstract is missing.