Authentication Protocols for Computer Networks: I.
Deepinder P. SidhuPublished in: Comput. Networks (1986)
Keyphrases
- computer networks
- authentication protocol
- smart card
- security analysis
- lightweight
- public key
- rfid tags
- security protocols
- network security
- network management
- intrusion detection system
- computer systems
- network traffic
- secret key
- cryptographic protocols
- security problems
- rfid systems
- security requirements
- intrusion detection
- database
- ban logic
- databases