Login / Signup

Man-in-the-Middle in Tunnelled Authentication Protocols.

N. AsokanValtteri NiemiKaisa Nyberg
Published in: Security Protocols Workshop (2003)
Keyphrases
  • authentication protocol
  • smart card
  • security analysis
  • lightweight
  • public key
  • rfid tags
  • security protocols
  • ban logic
  • cryptographic protocols
  • secret key
  • information systems
  • distributed systems
  • cost effective