Login / Signup
Man-in-the-Middle in Tunnelled Authentication Protocols.
N. Asokan
Valtteri Niemi
Kaisa Nyberg
Published in:
Security Protocols Workshop (2003)
Keyphrases
</>
authentication protocol
smart card
security analysis
lightweight
public key
rfid tags
security protocols
ban logic
cryptographic protocols
secret key
information systems
distributed systems
cost effective