Keyphrases
- cryptographic protocols
- security protocols
- authentication protocol
- security properties
- ban logic
- key exchange protocol
- key agreement protocol
- security analysis
- formal analysis
- communication protocols
- key distribution
- security requirements
- security model
- denial of service attacks
- physical layer
- mutual authentication
- rfid systems
- security services
- secure multiparty computation
- mobile agent system
- mobile payment
- virtual private network
- security issues
- key exchange
- information security
- key agreement
- security policies
- messages exchanged
- electronic voting
- medium access control
- cryptographic algorithms
- security problems
- key management
- access control
- lightweight
- elliptic curve
- blind signature
- network security
- secure routing
- trust negotiation
- wireless sensor networks
- diffie hellman
- provably secure
- application layer
- communication protocol
- security mechanisms
- statistical databases
- energy consumption
- intrusion detection
- network layer