Login / Signup

Proving secure properties of cryptographic protocols with knowledge based approach.

Xiaochun ChengXiaoqi MaMaggie Xiaoyan ChengScott C.-H. Huang
Published in: IPCCC (2005)
Keyphrases
  • cryptographic protocols
  • security properties
  • security protocols
  • standard model
  • encryption decryption
  • information systems
  • knowledge management
  • formal model
  • authentication protocol
  • image quality
  • data access