Amanote Research
Register
Sign In
A Bound on Attacks on Authentication Protocols
doi 10.1007/978-0-387-35608-2_48
Full Text
Open PDF
Abstract
Available in
full text
Date
January 1, 2002
Authors
Scott D. Stoller
Publisher
Springer US
Related search
A Bound on Attacks on Payment Protocols
Explicit Communication Revisited: Two New Attacks on Authentication Protocols
IEEE Transactions on Software Engineering
Software
Server Impersonation Attacks on RFID Protocols
A Tight Bound for Exhaustive Key Search Attacks Against Message Authentication Codes
RAIRO - Theoretical Informatics and Applications
Mathematics
Computer Science Applications
Software
Evaluation of Security Attacks on UMTS Authentication Mechanism
International Journal of Network Security & Its Applications
PPP Authentication Protocols
Attacks and Countermeasures on Routing Protocols in Wireless Networks
A Bound on the Capacity of Backoff and Acknowledgement-Based Protocols
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Compositional Analysis of Authentication Protocols
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science