Login / Signup

Cryptographic Protocol Explication and End-Point Projection.

Jay A. McCarthyShriram Krishnamurthi
Published in: ESORICS (2008)
Keyphrases
  • endpoints
  • cryptographic protocols
  • line segments
  • authentication protocol
  • single valued
  • standard model
  • insider attacks
  • continuous functions
  • minimal path
  • minimal paths