Login / Signup
Verifying authentication protocols: methodology and example.
Thomas Y. C. Woo
Simon S. Lam
Published in:
ICNP (1993)
Keyphrases
</>
authentication protocol
smart card
security analysis
public key
lightweight
model checking
rfid tags
cryptographic protocols
cost effective