Secure clock synchronization under collusion attacks.
Xiaoming DuanNikolaos M. FrerisPeng ChengPublished in: Allerton (2016)
Keyphrases
- security mechanisms
- secure routing
- security protocols
- stream cipher
- cryptographic protocols
- chosen plaintext
- secure communication
- remote user authentication scheme
- security measures
- cryptographic algorithms
- security flaws
- security threats
- security issues
- countermeasures
- key management
- block cipher
- high speed
- information leakage
- resource constrained
- java card
- method invocation
- smart card
- advanced encryption standard
- unauthorized access
- chaotic systems
- lightweight
- insider attacks
- access control
- security requirements
- power consumption
- authentication scheme
- user authentication
- data security
- ad hoc networks
- routing protocol
- authentication protocol
- standard model
- protection mechanisms
- security analysis
- secret key