On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol.
Michael BackesBirgit PfitzmannPublished in: SEC (2006)
Keyphrases
- key distribution
- security analysis
- mutual authentication
- security properties
- authentication protocol
- key management
- cryptographic protocols
- lightweight
- privacy protection
- security protocols
- provably secure
- communication protocol
- network protocols
- fault tolerant
- low cost
- neural network
- database
- coloured petri nets
- group communication
- tcp ip
- formal analysis
- security requirements
- smart card
- real time