Detecting collusion attacks in security protocols

Springer-Verlag Berlin
Publication Type:
Conference Proceeding
Frontiers Of WWW Research And Development - Apweb 2006, Proceedings - Lecture Notes in Computer Science, 2006, 3841 pp. 297 - 306
Issue Date:
Full metadata record
Files in This Item:
Filename Description Size
Thumbnail2006003921.pdf608.68 kB
Adobe PDF
Security protocols have been widely used to safeguard secure electronic transactions. We usually assume that principals are credible and shall not maliciously disclose their individual secrets to someone else. Nevertheless, it is impractical to completel
Please use this identifier to cite or link to this item: