Login / Signup

Verifying Group Authentication Protocols by Scyther.

Huihui YangVladimir A. OleshchukAndreas Prinz
Published in: J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. (2016)
Keyphrases
  • authentication protocol
  • smart card
  • lightweight
  • information systems
  • security analysis
  • data sets
  • public key
  • secret key
  • cryptographic protocols
  • rfid systems