Modeling key compromise impersonation attacks on group key exchange protocols.
M. Choudary GorantlaColin BoydJuan Manuel González NietoMark ManulisPublished in: ACM Trans. Inf. Syst. Secur. (2011)
Keyphrases
- key exchange
- security analysis
- secure communication
- smart card
- security protocols
- authentication protocol
- diffie hellman
- private key
- key distribution
- security requirements
- encryption scheme
- security properties
- public key
- secret key
- security mechanisms
- digital signature
- key exchange protocol
- distributed systems
- key technologies
- fault tolerant