Mixed Security Mode for the Two-Way Active Measurement Protocol (TWAMP).
Al MortonKaynam HedayatPublished in: RFC (2009)
Keyphrases
- security protocols
- cryptographic protocols
- authentication protocol
- key exchange protocol
- key agreement protocol
- security properties
- security analysis
- rfid systems
- security model
- mutual authentication
- denial of service attacks
- security issues
- communication protocols
- security requirements
- information security
- electronic voting
- mobile payment
- blind signature
- ban logic
- provably secure
- key distribution
- cryptographic algorithms
- key agreement
- protocol specification
- access control
- secure multiparty computation
- lightweight
- messages exchanged
- homomorphic encryption
- physical layer
- diffie hellman
- formal analysis
- elliptic curve
- blind signature scheme
- virtual private network
- secure routing
- privacy preserving
- network layer
- statistical databases
- security policies
- database systems
- semi honest
- contractual obligations
- key establishment
- trusted third party
- group communication
- tcp ip
- security mechanisms
- encryption scheme
- network security
- smart card
- electronic commerce
- distributed systems