Security Verification of 802.11i 4-Way Handshake Protocol.
Jing LiuXinming YeJun ZhangJun LiPublished in: ICC (2008)
Keyphrases
- cryptographic protocols
- protocol specification
- ban logic
- formal analysis
- security protocols
- authentication protocol
- high security
- security properties
- key agreement protocol
- security analysis
- communication protocols
- key exchange protocol
- information security
- security model
- model checker
- java card
- rfid systems
- standard model
- model checking
- mutual authentication
- mobile payment
- security requirements
- security issues
- integrity verification
- cryptographic algorithms
- security policies
- smart card
- provably secure
- trust negotiation
- electronic voting
- key distribution
- rfid tags
- network security
- secure routing
- access control
- contractual obligations
- colored petri nets
- denial of service attacks
- mobile agent system
- security level
- formal verification
- elliptic curve
- privacy protection
- intrusion detection