Login / Signup
Using SPIN to Detect Vulnerabilities in the AACS Drive-Host Authentication Protocol.
Wei Wang
Dongyao Ji
Published in:
FORTE (2008)
Keyphrases
</>
authentication protocol
smart card
security analysis
user authentication
lightweight
information security
public key
security protocols
authentication scheme
low cost
secret key
security mechanisms
rfid systems
nearest neighbor
cryptographic protocols