[1]
Kumaraswamy, P., Rao, C., Janaki, V. and Prashanth, K. 2016. Key Authentication Scheme-based on Discrete Logarithms and Chinese Remainder Theorem. Defence Science Journal. 66, 6 (Oct. 2016), 590-593. DOI:https://doi.org/10.14429/dsj.66.9649.