Hash chains to secure proactive protocols.
Thouraya Bouabana-TebibelKhadidja AyadPublished in: SpringSim (CNS) (2013)
Keyphrases
- cryptographic protocols
- authentication protocol
- security protocols
- key distribution
- hash functions
- key agreement protocol
- key exchange
- secure multiparty computation
- key establishment
- multi party
- security properties
- privacy preserving
- security services
- key management
- homomorphic encryption
- provably secure
- group communication
- trusted third party
- application level
- sensor networks
- authentication scheme
- mutual authentication
- security mechanisms
- user authentication
- hashing algorithm
- data structure
- communication protocol
- digital signature
- security analysis
- smart card
- context aware
- wireless medium
- public key cryptosystems