Login / Signup

Deniable Liaisons.

Abhinav NarainNick FeamsterAlex C. Snoeren
Published in: CCS (2014)
Keyphrases
  • authentication protocol
  • smart card
  • security analysis
  • lightweight
  • security protocols
  • rfid tags
  • public key
  • secret key
  • hash functions
  • response time
  • low cost
  • intrusion detection