Login / Signup
Identification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle Attacks.
Hiroaki Anada
Seiko Arita
Published in:
ProvSec (2010)
Keyphrases
</>
cryptographic protocols
cryptographic algorithms
security mechanisms
secure routing
security protocols
stream cipher
security measures
protection schemes
security flaws
theorem prover
security issues
lightweight
security threats
security requirements
countermeasures
watermarking scheme
chosen plaintext