Login / Signup
Seems Legit: Automated Analysis of Subtle Attacks on Protocols that Use Signatures.
Dennis Jackson
Cas Cremers
Katriel Cohn-Gordon
Ralf Sasse
Published in:
CCS (2019)
Keyphrases
</>
automated analysis
security protocols
cryptographic protocols
automated detection
visual analysis
biomedical imaging
malicious traffic
video analysis
cell nuclei
vocal cord
watermarking scheme
signature scheme
multimedia
authentication protocol
key distribution
security properties