Login / Signup
Rewriting-Based Verification of Authentication Protocols.
Kazuhiro Ogata
Kokichi Futatsugi
Published in:
Electron. Notes Theor. Comput. Sci. (2002)
Keyphrases
</>
authentication protocol
cryptographic protocols
formal analysis
ban logic
smart card
security analysis
lightweight
model checking
public key
security protocols
formal verification
rfid systems
standard model
high dimensional
wireless networks
hash functions