Login / Signup
On the Use of Key Assignment Schemes in Authentication Protocols.
James Alderman
Jason Crampton
Published in:
NSS (2013)
Keyphrases
</>
authentication protocol
smart card
security analysis
intrusion detection
data access
public key
cryptographic protocols