Security of Auditing Protocols Against Subversion Attacks.
Jiaxian LvYi WangJinshu SuRongmao ChenWenjun WuPublished in: Int. J. Found. Comput. Sci. (2020)
Keyphrases
- security protocols
- cryptographic protocols
- security mechanisms
- security threats
- security flaws
- security problems
- access control
- security services
- security properties
- java card
- malicious code detection
- security vulnerabilities
- security breaches
- authentication protocol
- security requirements
- statistical databases
- countermeasures
- computer security
- denial of service attacks
- cyber attacks
- security measures
- security issues
- key agreement protocol
- malicious attacks
- information security
- key management
- malicious users
- security risks
- stream cipher
- communication protocols
- intrusion detection
- information leakage
- key distribution
- security policies
- ddos attacks
- secure routing
- secure multiparty computation
- network security
- cyber security
- fault injection
- malicious nodes
- privacy preserving
- attack scenarios
- inference control
- standard model
- unauthorized access
- key exchange
- dos attacks