Login / Signup
Using a formal analysis technique to identify an unbinding attack on a buyer-seller watermarking protocol.
David M. Williams
Helen Treharne
Anthony T. S. Ho
Chris Culnane
Published in:
MM&Sec (2008)
Keyphrases
</>
formal analysis
payment protocol
electronic commerce
ban logic
authentication protocol
transaction costs
formal methods
supply chain
digital images
knowledge acquisition
lightweight
agent model
artificial intelligence
security analysis
trusted third party
digital watermark