Analysis of security protocols based on challenge-response
From MaRDI portal
Publication:2372525
Recommendations
- Analysis of security protocols as open systems
- Analysis of security protocols based on authentication test
- Security analysis of the modular enhanced symmetric role authentication (mERA) protocol
- scientific article; zbMATH DE number 1927581
- Analyzing security protocols with secrecy types and logic programs
Cites work
Cited in
(2)
This page was built for publication: Analysis of security protocols based on challenge-response
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2372525)