Login / Signup

Applying a Formal Analysis Technique to the CCITT X.509 Strong Two-Way Authentication Protocol.

Klaus GaarderEinar Snekkenes
Published in: J. Cryptol. (1991)
Keyphrases
  • formal analysis
  • ban logic
  • authentication protocol
  • smart card
  • security analysis
  • lightweight
  • public key
  • formal methods
  • secret key
  • agent model
  • rfid tags
  • query processing
  • low cost
  • hash functions
  • security protocols