Login / Signup
The Interrogator: Protocol Security Analysis.
Jonathan K. Millen
Sidney C. Clark
Sheryl B. Freedman
Published in:
IEEE Trans. Software Eng. (1987)
Keyphrases
</>
security analysis
mutual authentication
authentication protocol
security model
smart card
security requirements
public key
security properties
secure electronic
high security
encryption scheme
user authentication
key exchange
elliptic curve cryptography
image encryption
authentication scheme
private key