Login / Signup
Applying a Formal Analysis Technique to the CCITT X.509 Strong Two-Way Authentication Protocol.
Klaus Gaarder
Einar Snekkenes
Published in:
J. Cryptol. (1991)
Keyphrases
</>
formal analysis
ban logic
authentication protocol
smart card
security analysis
lightweight
public key
formal methods
secret key
agent model
rfid tags
query processing
low cost
hash functions
security protocols