Login / Signup
Towards Automatic Verification of Authentication Protocols on an Unbounded Network.
James Heather
Steve A. Schneider
Published in:
CSFW (2000)
Keyphrases
</>
authentication protocol
computer networks
real time
wireless sensor networks
dimensionality reduction
network traffic
smart card
data sets
peer to peer
computer systems
security analysis