Login / Signup
Deniable Liaisons.
Abhinav Narain
Nick Feamster
Alex C. Snoeren
Published in:
CCS (2014)
Keyphrases
</>
authentication protocol
smart card
security analysis
lightweight
security protocols
rfid tags
public key
secret key
hash functions
response time
low cost
intrusion detection