Login / Signup
An approach to finding the attacks on the cryptographic protocols.
Yongxing Sun
Xinmei Wang
Published in:
ACM SIGOPS Oper. Syst. Rev. (2000)
Keyphrases
</>
information sharing
cryptographic protocols
security protocols
standard model
security properties
authentication protocol
database
low cost
insider attacks