Key recycling in authentication

Key recycling in authentication

Papers citing "Key recycling in authentication"