The Empirical Evaluation of a Security-Oriented Datagram Protocol.
David P. AndersonDomenico FerrariP. Venkat RanganB. SartiranaPublished in: Performance (1987)
Keyphrases
- empirical evaluation
- cryptographic protocols
- security protocols
- authentication protocol
- ban logic
- key agreement protocol
- key exchange protocol
- security analysis
- formal analysis
- rfid systems
- security model
- access control
- communication protocols
- security properties
- lightweight
- intrusion detection
- information security
- mutual authentication
- security requirements
- key management
- provably secure
- security services
- mobile payment
- electronic voting
- key distribution
- security issues
- secure multiparty computation
- key agreement
- protocol specification
- secure routing
- diffie hellman
- key exchange
- denial of service attacks
- physical layer
- network layer
- security policies
- contractual obligations
- security mechanisms
- statistical databases
- homomorphic encryption
- messages exchanged
- network security
- cryptographic algorithms
- tcp ip
- elliptic curve
- virtual private network
- secret key
- sensor networks
- computer networks