Protocol insecurity with a finite number of sessions and composed keys is NP-complete

Author: Rusinowitch M.   Turuani M.  

Publisher: Elsevier

ISSN: 0304-3975

Source: Theoretical Computer Science, Vol.299, Iss.1, 2003-04, pp. : 451-475

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Previous Menu Next

Abstract