Kleptography in Authentication Protocols: Why is it Still Possible?

Summary

This is a publication. If there is no link to the publication on this page, you can try the pre-formated search via the search engines listed on this page.

Authors: Carina Heßeling, Jörg Keller, Sebastian Litzinger

Journal title: European Interdisciplinary Cybersecurity Conference (EICC)

Journal publisher: ACM

Published year: 2022