Login / Signup

An approach to finding the attacks on the cryptographic protocols.

Yongxing SunXinmei Wang
Published in: ACM SIGOPS Oper. Syst. Rev. (2000)
Keyphrases
  • information sharing
  • cryptographic protocols
  • security protocols
  • standard model
  • security properties
  • authentication protocol
  • database
  • low cost
  • insider attacks