Login / Signup
Seems Legit: Automated Analysis of Subtle Attacks on Protocols that Use Signatures.
Dennis Jackson
Cas Cremers
Katriel Cohn-Gordon
Ralf Sasse
Published in:
IACR Cryptol. ePrint Arch. (2019)
Keyphrases
</>
automated analysis
security protocols
cryptographic protocols
automated detection
biomedical imaging
visual analysis
security properties
motion imagery
video analysis
anti virus
authentication protocol
cell nuclei
malicious traffic
databases
computer security