Login / Signup

An attack on the Interlock Protocol when used for authentication.

Steven M. BellovinMichael Merritt
Published in: IEEE Trans. Inf. Theory (1994)
Keyphrases