Browsing by Subject "attacks on cryptographic protocols"
Now showing items 1-1 of 1
-
Vulnerabilities and verification of cryptographic protocols and their future in Wireless Body Area Networks
( IEEE , 2012 , Conference Paper)In network security goals such as confidentiality, authentication, integrity and non-repudiation can be achieved using cryptographic techniques. Cryptographic techniques are techniques to hide information from unauthorized ...