Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols.
Jue-Sam ChouYalin ChenMing-De YangPublished in: IACR Cryptol. ePrint Arch. (2005)
Keyphrases
- key establishment
- authentication protocol
- secret key
- key distribution
- sensor networks
- wireless sensor networks
- key management
- pairwise
- symmetric key
- security protocols
- smart card
- key agreement protocol
- security mechanisms
- security analysis
- resource constrained
- public key
- rfid tags
- hash functions
- similarity measure
- cryptographic protocols
- secure communication
- diffie hellman
- lightweight
- digital signature
- computer networks
- group communication
- sensor nodes
- data streams