Login / Signup
Security Analysis of Michael: The IEEE 802.11i Message Integrity Code.
Jianyong Huang
Jennifer Seberry
Willy Susilo
Martin W. Bunder
Published in:
EUC Workshops (2005)
Keyphrases
</>
security analysis
security requirements
smart card
security model
high security
public key
source code
encryption scheme
security properties
authentication scheme
image encryption
mutual authentication
designated verifier
data integrity
ad hoc networks
data protection
private key
information systems