Login / Signup

On the Security of Three-Party Cryptographic Protocols.

Shouhuai XuGendu ZhangHong Zhu
Published in: ACM SIGOPS Oper. Syst. Rev. (1998)
Keyphrases
  • cryptographic protocols
  • security properties
  • security protocols
  • standard model
  • encryption decryption
  • insider attacks
  • authentication protocol
  • database
  • wireless sensor networks
  • lightweight