Login / Signup
Research on vulnerability mining of authentication protocol based on fuzzy simulation.
Lele Lv
Zhi Feng
Wei Dong
Yunfei Zhao
Yunze Zhao
Xinyu Gai
Published in:
BMSB (2023)
Keyphrases
</>
authentication protocol
fuzzy association rules
smart card
fuzzy sets
data mining
security analysis
security protocols
information systems
lightweight
data integration
public key
real time
password authentication