Login / Signup
Security analysis of a widely deployed locking system.
Michael Weiner
Maurice Massar
Erik Tews
Dennis Giese
Wolfgang Wieser
Published in:
CCS (2013)
Keyphrases
</>
security analysis
public key
smart card
security requirements
security properties
high security
authentication protocol
security model
image encryption
encryption scheme
database systems
data objects
user authentication
authentication scheme
mutual authentication