Login / Signup

Intercepting tokens in cryptographic protocols: The empire strikes back in the clone wars.

Özgür DagdelenMarc Fischlin
Published in: ISIT (2014)
Keyphrases
  • cryptographic protocols
  • standard model
  • security properties
  • line segments
  • authentication protocol
  • security protocols
  • real time
  • data streams
  • image compression
  • formal verification