Login / Signup

Identifying andTesting for Insecure Paths in Cryptographic Protocol Implementations.

K. R. Jayaram
Published in: COMPSAC (2) (2006)
Keyphrases
  • cryptographic protocols
  • authentication protocol
  • shortest path
  • security protocols
  • information systems
  • database systems
  • smart card
  • efficient implementation
  • secret key
  • security analysis