Attack on Shao's key agreement protocol. / Alassiry, T.; Ng, Siaw-Lynn; Wild, P.

In: IEE Proceedings - Information Security, Vol. 153, No. 2, 2006, p. 54-57.

Research output: Contribution to journalArticle

Published

Standard

Attack on Shao's key agreement protocol. / Alassiry, T.; Ng, Siaw-Lynn; Wild, P.

In: IEE Proceedings - Information Security, Vol. 153, No. 2, 2006, p. 54-57.

Research output: Contribution to journalArticle

Harvard

Alassiry, T, Ng, S-L & Wild, P 2006, 'Attack on Shao's key agreement protocol', IEE Proceedings - Information Security, vol. 153, no. 2, pp. 54-57.

APA

Alassiry, T., Ng, S-L., & Wild, P. (2006). Attack on Shao's key agreement protocol. IEE Proceedings - Information Security, 153(2), 54-57.

Vancouver

Alassiry T, Ng S-L, Wild P. Attack on Shao's key agreement protocol. IEE Proceedings - Information Security. 2006;153(2):54-57.

Author

Alassiry, T. ; Ng, Siaw-Lynn ; Wild, P. / Attack on Shao's key agreement protocol. In: IEE Proceedings - Information Security. 2006 ; Vol. 153, No. 2. pp. 54-57.

BibTeX

@article{99eaf4f6108f46db9f0ca3b57d6006c9,
title = "Attack on Shao's key agreement protocol",
author = "T. Alassiry and Siaw-Lynn Ng and P. Wild",
year = "2006",
language = "English",
volume = "153",
pages = "54--57",
journal = "IEE Proceedings - Information Security",
number = "2",

}

RIS

TY - JOUR

T1 - Attack on Shao's key agreement protocol

AU - Alassiry, T.

AU - Ng, Siaw-Lynn

AU - Wild, P.

PY - 2006

Y1 - 2006

M3 - Article

VL - 153

SP - 54

EP - 57

JO - IEE Proceedings - Information Security

JF - IEE Proceedings - Information Security

IS - 2

ER -