Login / Signup
Detection and Prevention of New Attacks for ID-based Authentication Protocols.
Jinyong Chen
Reiner Dojen
Anca Jurcut
Published in:
CoRR (2021)
Keyphrases
</>
authentication protocol
public key
cryptographic protocols
security protocols
key distribution
user authentication
anomaly detection
operating system
smart card
security analysis
security problems