Login / Signup
Security Analysis of the SASI Protocol.
Tianjie Cao
Elisa Bertino
Hong Lei
Published in:
IEEE Trans. Dependable Secur. Comput. (2009)
Keyphrases
</>
security analysis
mutual authentication
authentication protocol
smart card
security model
public key
security properties
security requirements
secure electronic
high security
key exchange
image encryption
encryption algorithm
user authentication
encryption scheme
information security
data integration
low cost