Understanding the intruder through attacks on cryptographic protocols

Abstract

The vulnerability and importance of computers, robots, internet etc, demand the employment of exceedingly reliable methods in the design of secure systems. Security protocols are one of the most important design parameters. History has proven security protocols to be vulnerable even after they enjoyed circumspect design and meticulous review by experts. We… (More)
DOI: 10.1145/1185448.1185594

Topics

Figures and Tables

Sorry, we couldn't extract any figures or tables for this paper.

Statistics

02040201520162017
Citations per Year

Citation Velocity: 7

Averaging 7 citations per year over the last 3 years.

Learn more about how we calculate this metric in our FAQ.