Author:
Ahmed Naveed,Jensen Christian D.
Publisher
Springer Berlin Heidelberg
Reference23 articles.
1. Abadi, M.: Secrecy by typing in security protocols. J. ACM 46, 749–786 (1999)
2. Ahmed, N., Jensen, C.D.: Adaptable authentication model. Tech. Rep. IMM-Technical Report-2010-17, DTU Informatics, Lyngby, Denmark (2010)
3. Ahmed, N., Jensen, C.D.: Definition of entity authentication. In: 2nd International Workshop on Security and Communication Networks, pp. 1–7 (May 2010)
4. Ahmed, N., Jensen, C.D.: Entity authentication:analysis using structured intuition. In: Technical Report of NODES 2010 (2010)
5. Avoine, G.: Cryptography in Radio Frequency Identification and Fair Exchange Protocols. Ph.D. thesis, EPFL, Lausanne, Switzerland (2005)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Adversary Models for Mobile Device Authentication;ACM Computing Surveys;2022-12-31
2. Post-Session Authentication;IFIP Advances in Information and Communication Technology;2012