Lower and upper bounds for attacks on authentication protocols

  • Authors:
  • Scott D. Stoller

  • Affiliations:
  • Computer Science Dept., Indiana University, Bloomington, IN

  • Venue:
  • Proceedings of the eighteenth annual ACM symposium on Principles of distributed computing
  • Year:
  • 1999

Quantified Score

Hi-index 0.00

Visualization

Abstract