Authentication primitives for secure protocol specifications.
Chiara BodeiPierpaolo DeganoRiccardo FocardiCorrado PriamiPublished in: Future Gener. Comput. Syst. (2005)
Keyphrases
- authentication protocol
- password authentication
- key distribution
- security analysis
- mutual authentication
- user authentication
- key agreement protocol
- cryptographic protocols
- smart card
- session key
- authentication scheme
- authentication mechanism
- security protocols
- key agreement
- high level
- security requirements
- key exchange protocol
- covert channel
- ban logic
- trusted third party
- lightweight
- group communication
- key management
- secret key
- public key
- scalar product
- rfid tags
- protocol specification
- rfid systems
- security services
- secure communication
- security mechanisms
- key exchange
- data encryption
- secure routing
- diffie hellman
- formal specification
- security model
- secure manner
- integrity verification
- resource constrained
- privacy preserving
- identity management
- private key
- security properties
- privacy protection
- factor authentication
- elliptic curve
- provably secure
- multi party
- formal analysis
- access control