Login / Signup

Tailoring authentication protocols to match underlying mechanisms.

Liqun ChenDieter GollmannChris J. Mitchell
Published in: ACISP (1996)
Keyphrases
  • authentication protocol
  • smart card
  • security analysis
  • lightweight
  • public key
  • rfid tags
  • security protocols
  • cryptographic protocols
  • data sets
  • nearest neighbor