Login / Signup
Understanding the intruder through attacks on cryptographic protocols.
Shahabuddin Muhammad
Zeeshan Furqan
Ratan K. Guha
Published in:
ACM Southeast Regional Conference (2006)
Keyphrases
</>
cryptographic protocols
security properties
security protocols
standard model
authentication protocol
insider attacks
private information retrieval
end to end