Login / Signup

Specifying Authentication Protocols Using Rewriting and Strategies.

Horatiu Cirstea
Published in: PADL (2001)
Keyphrases
  • authentication protocol
  • lightweight
  • security analysis
  • smart card
  • public key
  • cryptographic protocols
  • real time
  • query processing
  • e government
  • distributed systems
  • security requirements