Security Analysis in Probabilistic Distributed Protocols via Bounded Reachability.
Silvia S. PelozoPedro R. D'ArgenioPublished in: TGC (2012)
Keyphrases
- security analysis
- authentication protocol
- security properties
- key exchange
- mutual authentication
- security requirements
- smart card
- secure electronic
- public key
- high security
- image encryption
- multi agent
- user authentication
- distributed environment
- distributed systems
- lightweight
- encryption algorithm
- key distribution
- private key
- elliptic curve cryptography
- computer networks
- digital signature
- information sharing
- encryption scheme
- loosely coupled
- multi agent systems
- software architecture
- similarity measure