Login / Signup

Towards Automatic Verification of Authentication Protocols on an Unbounded Network.

James HeatherSteve A. Schneider
Published in: CSFW (2000)
Keyphrases
  • authentication protocol
  • computer networks
  • real time
  • wireless sensor networks
  • dimensionality reduction
  • network traffic
  • smart card
  • data sets
  • peer to peer
  • computer systems
  • security analysis