Login / Signup
Man-in-the-Middle in Tunnelled Authentication Protocols.
N. Asokan
Valtteri Niemi
Kaisa Nyberg
Published in:
IACR Cryptol. ePrint Arch. (2002)
Keyphrases
</>
authentication protocol
smart card
security analysis
lightweight
public key
security protocols
rfid tags
secret key
cryptographic protocols
database systems
sensor networks
resource constrained
ban logic