Login / Signup
A way to find counterexamples located at deep positions with domain knowledge of authentication protocols.
Naomi Okumura
Kazuhiro Ogata
Published in:
ICSCA (2023)
Keyphrases
</>
authentication protocol
domain knowledge
smart card
security analysis
public key
rfid tags
lightweight
cryptographic protocols
rfid systems
security protocols
data sets
secret key
prior knowledge
query processing