Login / Signup

Verifying authentication protocols: methodology and example.

Thomas Y. C. WooSimon S. Lam
Published in: ICNP (1993)
Keyphrases
  • authentication protocol
  • smart card
  • security analysis
  • public key
  • lightweight
  • model checking
  • rfid tags
  • cryptographic protocols
  • cost effective