Login / Signup
Cryptographic Protocol Composition via the Authentication Tests.
Joshua D. Guttman
Published in:
IACR Cryptol. ePrint Arch. (2008)
Keyphrases
</>
cryptographic protocols
authentication protocol
encryption decryption
security analysis
user authentication
security protocols
smart card
security properties
biometric authentication
secret key
standard model
authentication scheme
security requirements
elliptic curve