Login / Signup
Security properties analysis in a TPM-based protocol.
Younes Seifi
Suriadi Suriadi
Ernest Foo
Colin Boyd
Published in:
Int. J. Secur. Networks (2014)
Keyphrases
</>
security properties
security protocols
security analysis
low cost
multi agent systems
end to end
formal model
cryptographic protocols