Authentication of parties in piggy bank cryptography | IEEE Conference Publication | IEEE Xplore