Security evaluation over lightweight cryptographic protocols.
Seyed-Mohsen GhoreishiShukor Abd RazakIsmail Fauzi IsninHassan ChizariPublished in: ISBAST (2014)
Keyphrases
- lightweight
- cryptographic protocols
- authentication protocol
- security properties
- security protocols
- rfid tags
- smart card
- dos attacks
- encryption decryption
- security analysis
- standard model
- public key
- wireless sensor networks
- security requirements
- security policies
- network security
- privacy preserving
- development environments