Search
Now showing items 1-1 of 1
Attack analysis of cryptographic protocols using strand spaces
(2003)
Security protocols make use of cryptographic techniques to achieve goals such as confidentiality, authentication and integrity. However, the fact that strong cryptographic algorithms exist does not guarantee the security ...