Login / Signup

Research on vulnerability mining of authentication protocol based on fuzzy simulation.

Lele LvZhi FengWei DongYunfei ZhaoYunze ZhaoXinyu Gai
Published in: BMSB (2023)
Keyphrases
  • authentication protocol
  • fuzzy association rules
  • smart card
  • fuzzy sets
  • data mining
  • security analysis
  • security protocols
  • information systems
  • lightweight
  • data integration
  • public key
  • real time
  • password authentication