Login / Signup
Typing secure implementation of authentication protocols in environments with compromised principals.
Behnam Sattarzadeh
Mehran S. Fallah
Published in:
Secur. Commun. Networks (2014)
Keyphrases
</>
authentication protocol
smart card
security analysis
cryptographic protocols
public key
lightweight
rfid systems
security protocols
database systems
key distribution
user authentication
access control
computer systems
rfid tags
security requirements
secret key