Graphical representation of attacks on security protocol
In a digital age, cryptographic security protocols are extremely important in ensuring a secure communication in an open network. Many research has arise in the field of protocol design and verification. However, verification of protocol can be extremely difficult to be done manually. With massive a...
Saved in:
Main Author: | Wang, Jianfang |
---|---|
Other Authors: | Alwen Fernanto Tiu |
Format: | Final Year Project |
Language: | English |
Published: |
2016
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/66777 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
A security protocol resistant to intermittent position trace attacks and desynchronization attacks in RFID systems
by: Shu, Yantai, et al.
Published: (2013) -
Graphical wireless medium access control (MAC) protocol simulator
by: Tan, Shermin Weixiu
Published: (2014) -
Security protocol design against malicious attacks in 4G LTE wireless systems
by: Wang, Xilei
Published: (2014) -
Graphical representation of biomolecules
by: Su, Xinhui
Published: (2024) -
Security protocol design against malicious attacks in neighborhood area network in smart grid
by: Li, Xiaochen
Published: (2016)