Login / Signup

A Directed Graph-Based Authentication Protocol Model and Its Security Analysis.

Hong-Bo XieYuan-chen WuMing-Tian Zhou
Published in: FCST (2006)
Keyphrases
  • security analysis
  • authentication protocol
  • smart card
  • data streams
  • ad hoc networks