Login / Signup
A Syntactic Criterion for Injectivity of Authentication Protocols.
Cas J. F. Cremers
Sjouke Mauw
Erik P. de Vink
Published in:
Electron. Notes Theor. Comput. Sci. (2005)
Keyphrases
</>
authentication protocol
smart card
security analysis
lightweight
natural language
public key
rfid tags
secret key
hash functions
rfid systems
security protocols
data sets
database systems
operating system
cost effective