Abstract
Recently Shim gave an attack on Harn's modified authenticated multiple-key agreement protocol. The authors point out Shim's attack is not workable. However, Harn's modified protocol is still insecure and the authors give another attack on it. Finally, the authors propose an efficient protocol that can prevent this attack.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have