Login / Signup
Computationally Analyzing the ISO 9798-2.4 Authentication Protocol.
Britta Hale
Colin Boyd
Published in:
SSR (2014)
Keyphrases
</>
authentication protocol
smart card
lightweight
security analysis
public key
security protocols
rfid tags
secret key
rfid systems
mutual authentication
information systems
data analysis
sensor networks
software systems
password authentication