Login / Signup
Two Attacks on Neuman-Stubblebine Authentication Protocols.
Tzonelih Hwang
Narn-Yih Lee
Chuan-Ming Li
Ming-Yung Ko
Yung-Hsiang Chen
Published in:
Inf. Process. Lett. (1995)
Keyphrases
</>
authentication protocol
security protocols
cryptographic protocols
smart card
security analysis
security mechanisms
user authentication
public key
lightweight
key management
rfid tags
standard model
secret key
hash functions
secure communication
operating system
information systems