Login / Signup

Kleptographic Weaknesses in Benaloh-Tuinstra Protocol.

Piotr BorzeckiJedrzej KabarowskiPrzemyslaw KubiakMiroslaw KutylowskiFilip Zagórski
Published in: ICSNC (2006)
Keyphrases
  • lightweight
  • authentication protocol
  • cryptographic protocols
  • cooperative
  • security protocols
  • rfid systems
  • data sets
  • privacy preserving
  • group communication
  • multiple access
  • key exchange protocol