Secure Against Man-in-the-Middle Attacks.
Julien BringerHervé ChabannePublished in: IEEE Trans. Inf. Theory (2008)
Keyphrases
- secure routing
- security mechanisms
- security protocols
- stream cipher
- cryptographic protocols
- chosen plaintext
- security measures
- security flaws
- remote user authentication scheme
- countermeasures
- block cipher
- cryptographic algorithms
- advanced encryption standard
- security threats
- security management
- unauthorized access
- information leakage
- sql injection
- security issues
- malicious attacks
- ad hoc networks
- security problems
- routing protocol
- resource constrained
- security requirements
- smart card
- authentication protocol
- insider attacks
- key management
- malicious users
- attack detection
- traffic analysis
- security analysis
- information security
- user authentication