Login / Signup
Tailoring authentication protocols to match underlying mechanisms.
Liqun Chen
Dieter Gollmann
Chris J. Mitchell
Published in:
ACISP (1996)
Keyphrases
</>
authentication protocol
smart card
security analysis
lightweight
public key
rfid tags
security protocols
cryptographic protocols
data sets
nearest neighbor