Login / Signup
Secure Composition of Insecure Components.
Peter Sewell
Jan Vitek
Published in:
CSFW (1999)
Keyphrases
</>
authentication scheme
authentication protocol
key distribution
diffie hellman
neural network
website
private key
real world
social networks
case study
building blocks
security issues
security requirements
user authentication