Login / Signup

On the Use of Key Assignment Schemes in Authentication Protocols.

James AldermanJason Crampton
Published in: NSS (2013)
Keyphrases
  • authentication protocol
  • smart card
  • security analysis
  • intrusion detection
  • data access
  • public key
  • cryptographic protocols