On Strengthening Authentication Protocols to Foil Cryptanalysis.
Wenbo MaoColin BoydPublished in: ESORICS (1994)
Keyphrases
- authentication protocol
- secret key
- hash functions
- smart card
- public key
- inductive logic programming
- secure communication
- cryptographic protocols
- relational learning
- lightweight
- rfid tags
- signature scheme
- security analysis
- diffie hellman
- ciphertext
- key management
- similarity search
- encryption scheme
- security protocols
- ban logic
- knn
- image quality
- low cost
- nearest neighbor