Security vulnerability analysis of OpenHIP and E-HIP protocols.
Adam GajdosíkPeter KanuchPublished in: TSP (2021)
Keyphrases
- security protocols
- cryptographic protocols
- communication protocols
- key agreement protocol
- authentication protocol
- security properties
- access control
- security services
- key distribution
- secure multiparty computation
- security requirements
- key exchange
- intrusion detection
- information security
- key management
- security policies
- security issues
- messages exchanged
- key establishment
- network security
- privacy preserving
- application level
- computer security
- security threats
- security mechanisms
- statistical databases
- security model
- wireless networks
- information systems
- secret key