Login / Signup
Identifying andTesting for Insecure Paths in Cryptographic Protocol Implementations.
K. R. Jayaram
Published in:
COMPSAC (2) (2006)
Keyphrases
</>
cryptographic protocols
authentication protocol
shortest path
security protocols
information systems
database systems
smart card
efficient implementation
secret key
security analysis