Google Research

Efficient and secure authenticated key exchange using weak passwords

J. ACM, vol. 57 (2009), pp. 1-39


No abstract available; check out the Download or Google Scholar links above for publications details.

Learn more about how we do research

We maintain a portfolio of research projects, providing individuals and teams the freedom to emphasize specific types of work