ISW   2000 International Information Security Workshop (later ISC)
Wall of Fame | Most Viewed ISW-2000 Paper
8 years 9 months ago
Classification of Authentication Protocols: A Practical Approach
We propose a simple classification method for public-key based authentication protocols, which consists of identifying several basic properties leading to a large number of generic...
DongGook Park, Colin Boyd, Ed Dawson
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
1Download preprint from source206
2Download preprint from source150
3Download preprint from source143
4Download preprint from source139
5Download preprint from source139
6Download preprint from source129
7Download preprint from source106