Login / Signup
On the Security of Three-Party Cryptographic Protocols.
Shouhuai Xu
Gendu Zhang
Hong Zhu
Published in:
ACM SIGOPS Oper. Syst. Rev. (1998)
Keyphrases
</>
cryptographic protocols
security properties
security protocols
standard model
encryption decryption
insider attacks
authentication protocol
database
wireless sensor networks
lightweight