Amanote Research

Amanote Research

    RegisterSign In

A Bound on Attacks on Authentication Protocols

doi 10.1007/978-0-387-35608-2_48
Full Text
Open PDF
Abstract

Available in full text

Date

January 1, 2002

Authors
Scott D. Stoller
Publisher

Springer US


Related search

A Bound on Attacks on Payment Protocols

English

Explicit Communication Revisited: Two New Attacks on Authentication Protocols

IEEE Transactions on Software Engineering
Software
1997English

Server Impersonation Attacks on RFID Protocols

2008English

A Tight Bound for Exhaustive Key Search Attacks Against Message Authentication Codes

RAIRO - Theoretical Informatics and Applications
MathematicsComputer Science ApplicationsSoftware
2012English

Evaluation of Security Attacks on UMTS Authentication Mechanism

International Journal of Network Security & Its Applications
2012English

PPP Authentication Protocols

1992English

Attacks and Countermeasures on Routing Protocols in Wireless Networks

English

A Bound on the Capacity of Backoff and Acknowledgement-Based Protocols

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2000English

Compositional Analysis of Authentication Protocols

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2004English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy