Login / Signup
On vulnerability analysis of several password authentication protocols.
Keith Garrett
Sai Raghu Talluri
Swapnoneel Roy
Published in:
Innov. Syst. Softw. Eng. (2015)
Keyphrases
</>
authentication protocol
user authentication
password authentication
session key
smart card
security analysis
lightweight
public key
security protocols
secret key
rfid tags
key distribution
cryptographic protocols
data sets
ban logic
hash functions
information systems
information security