Login / Signup

Understanding the intruder through attacks on cryptographic protocols.

Shahabuddin MuhammadZeeshan FurqanRatan K. Guha
Published in: ACM Southeast Regional Conference (2006)
Keyphrases
  • cryptographic protocols
  • security properties
  • security protocols
  • standard model
  • authentication protocol
  • insider attacks
  • private information retrieval
  • end to end