Login / Signup
Cryptanalysis of a suite of deniable authentication protocols.
Robert W. Zhu
Duncan S. Wong
Chan H. Lee
Published in:
IEEE Commun. Lett. (2006)
Keyphrases
</>
authentication protocol
secret key
hash functions
smart card
public key
lightweight
security analysis
security protocols
ban logic
cryptographic protocols
rfid tags
rfid systems
similarity search
feature space
encryption scheme
signature scheme
data distribution
sensor networks
nearest neighbor