Login / Signup
Hidden-ID Authentication Scheme and its SVO-Logic Based Formal Analysis.
Jin Jiang
Lei Li
Zhihong Huang
Published in:
CIS (2007)
Keyphrases
</>
formal analysis
authentication scheme
smart card
user authentication
secret key
public key
formal methods
agent model
security flaws
security analysis
authentication protocol
knowledge representation
real time
image authentication
ban logic
distributed environment
artificial intelligence