A Security Analysis and Revised Security Extension for the Precision Time Protocol.
Eyal ItkinAvishai WoolPublished in: CoRR (2016)
Keyphrases
- security analysis
- mutual authentication
- security requirements
- authentication protocol
- security properties
- security model
- high security
- smart card
- secure electronic
- public key
- internet banking
- key exchange
- encryption scheme
- elliptic curve cryptography
- private key
- image encryption
- encryption algorithm
- user authentication
- security policies
- information security
- authentication scheme
- security mechanisms
- security protocols
- access control
- software development
- lightweight
- software architecture
- cryptographic protocols