Login / Signup
Cryptographic Protocol Composition via the Authentication Tests.
Joshua D. Guttman
Published in:
FoSSaCS (2009)
Keyphrases
</>
cryptographic protocols
authentication protocol
encryption decryption
security protocols
user authentication
authentication scheme
smart card
test cases
secret key
standard model
security properties
lightweight
security mechanisms
data security
insider attacks