Computer Science ›› 2007, Vol. 34 ›› Issue (10): 103-105.

Previous Articles     Next Articles

  

  • Online:2018-11-16 Published:2018-11-16

Abstract: In application, when multiple form transformations of key atomic value occur, there should be multiple authentication tests. With the conception of Key Component, a new method called Multiple Authentication Test is presented. Then the Woo-Lain protocol is

Key words: Authentication test, Woo-Lam protocol, Key component, Multiple authentication test, Role asymmetry

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!