Replay tolerance of authentication protocols
Computer Communications
Saved in:
Main Author: | Lam, K.-Y. |
---|---|
Other Authors: | INFORMATION SYSTEMS & COMPUTER SCIENCE |
Format: | Article |
Published: |
2014
|
Subjects: | |
Online Access: | http://scholarbank.nus.edu.sg/handle/10635/99401 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | National University of Singapore |
Similar Items
-
An authentication protocol for mobile IP
by: Casanova, Philip B.
Published: (1999) -
HASVC: An efficient hybrid authentication scheme for vehicular communication
by: Guo, H., et al.
Published: (2014) -
A survey on privacy frameworks for RFID authentication
by: SU, Chunhua, et al.
Published: (2012) -
A Security and Performance Evaluation of Hash-Based Rfid Protocols
by: Lim, Tong-Lee, et al.
Published: (2008) -
Finding flaws from password authentication code in Android apps
by: MA, Siqi, et al.
Published: (2019)