Return to Article Details Key Authentication Scheme-based on Discrete Logarithms and Chinese Remainder Theorem Download Download PDF