Login / Signup
On the Properties of Cryptographic Protocols and the Weakness of the BAN-like Logics.
Shouhuai Xu
Gendu Zhang
Hong Zhu
Published in:
ACM SIGOPS Oper. Syst. Rev. (1997)
Keyphrases
</>
cryptographic protocols
expressive power
database
authentication protocol
security properties
information systems
database systems
similarity measure
standard model