Computer Science ›› 2007, Vol. 34 ›› Issue (10): 103-105.
Previous Articles Next Articles
Online:
Published:
Abstract: In application, when multiple form transformations of key atomic value occur, there should be multiple authentication tests. With the conception of Key Component, a new method called Multiple Authentication Test is presented. Then the Woo-Lain protocol is
Key words: Authentication test, Woo-Lam protocol, Key component, Multiple authentication test, Role asymmetry
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2007/V34/I10/103
Cited