Login / Signup
Proving secure properties of cryptographic protocols with knowledge based approach.
Xiaochun Cheng
Xiaoqi Ma
Maggie Xiaoyan Cheng
Scott C.-H. Huang
Published in:
IPCCC (2005)
Keyphrases
</>
cryptographic protocols
security properties
security protocols
standard model
encryption decryption
information systems
knowledge management
formal model
authentication protocol
image quality
data access