Protocols for Authentication and Key Establishment

Protocols for Authentication and Key Establishment
Colin Boyd

Martin Abadi. Explicit communication revisited: Two new attacks on authentication protocols. IEEE Transactions on Software Engineering, 23(3):185- 186, March 1997. 2. Martin Abadi. Two facets of authentication. In 11th IEEE Computer ...

Download

Download Free Books Downloader

Version: 1.0.0.1. File Size: 1.97 MB