Login / Signup
Cryptographic Protocol Explication and End-Point Projection.
Jay A. McCarthy
Shriram Krishnamurthi
Published in:
ESORICS (2008)
Keyphrases
</>
endpoints
cryptographic protocols
line segments
authentication protocol
single valued
standard model
insider attacks
continuous functions
minimal path
minimal paths