Login / Signup

A way to find counterexamples located at deep positions with domain knowledge of authentication protocols.

Naomi OkumuraKazuhiro Ogata
Published in: ICSCA (2023)
Keyphrases
  • authentication protocol
  • domain knowledge
  • smart card
  • security analysis
  • public key
  • rfid tags
  • lightweight
  • cryptographic protocols
  • rfid systems
  • security protocols
  • data sets
  • secret key
  • prior knowledge
  • query processing