Login / Signup
What is the best way to prove a cryptographic protocol correct?
Sreekanth Malladi
Gurdeep S. Hura
Published in:
IPDPS (2008)
Keyphrases
</>
cryptographic protocols
standard model
security properties
similarity measure
authentication protocol