Login / Signup
Fully Deniable Message Authentication Protocols Preserving Confidentiality.
Lein Harn
Chia-Yin Lee
Changlu Lin
Chin-Chen Chang
Published in:
Comput. J. (2011)
Keyphrases
</>
authentication protocol
smart card
security analysis
lightweight
public key
security properties
security protocols
rfid tags
information security
ban logic
cryptographic protocols
hash functions
secret key
rfid systems
real time
security requirements
intrusion detection
access control
information systems