Login / Signup
Transforming Password Protocols to Compose.
Céline Chevalier
Stéphanie Delaune
Steve Kremer
Published in:
FSTTCS (2011)
Keyphrases
</>
genetic algorithm
user authentication
cryptographic protocols
communication protocols
information security
application level
database
neural network
information retrieval
multi party
authentication protocol
communication protocol
authentication systems
session key