Login / Signup
Protocol Interactions and the Chosen Protocol Attack.
John Kelsey
Bruce Schneier
David A. Wagner
Published in:
Security Protocols Workshop (1997)
Keyphrases
</>
authentication protocol
key exchange protocol
formal analysis
denial of service attacks
lightweight
communication protocol
network protocols
key distribution
tcp ip
coloured petri nets
digital libraries
application layer
cryptographic protocols
key agreement protocol