Login / Signup

Security properties analysis in a TPM-based protocol.

Younes SeifiSuriadi SuriadiErnest FooColin Boyd
Published in: Int. J. Secur. Networks (2014)
Keyphrases
  • security properties
  • security protocols
  • security analysis
  • low cost
  • multi agent systems
  • end to end
  • formal model
  • cryptographic protocols