Deciding the Correctness of Attacks on Authentication Protocols.
Anders Moen HagalislettoPublished in: J. Softw. (2008)
Keyphrases
- authentication protocol
- security protocols
- cryptographic protocols
- smart card
- security analysis
- lightweight
- user authentication
- security mechanisms
- rfid tags
- public key
- ban logic
- secure communication
- key management
- secret key
- real time
- security requirements
- watermarking scheme
- hash functions
- image compression
- security problems
- knn
- data sets