Login / Signup
A Scenario-Based Protocol Checker for Public-Key Authentication Scheme.
Takamichi Saito
Published in:
IEICE Trans. Inf. Syst. (2009)
Keyphrases
</>
authentication scheme
public key
authentication protocol
security analysis
security model
provably secure
secret key
blind signature
diffie hellman
user authentication
image encryption
elliptic curve cryptography
image authentication
digital signature
secure communication
private key
public key cryptography
signature scheme
key distribution
lightweight
rfid tags
cryptographic protocols
smart card
blind signature scheme
high security
security properties
trusted third party
cost effective