Login / Signup
Analysing the Vulnerability of Protocols to Produce Known-pair and Chosen-text Attacks.
Steve Kremer
Mark Ryan
Published in:
Electron. Notes Theor. Comput. Sci. (2005)
Keyphrases
</>
security protocols
buffer overflow
text documents
text retrieval
security risks
database
keywords
text mining
free text
information retrieval
security vulnerabilities
pairwise
security flaws
natural language
key concepts
textual data