On the Security of WAI Protocol in the Third Version of WAPI.
Zhao-Hui TangLi XuZhide ChenFuchun GuoPublished in: IIH-MSP (2008)
Keyphrases
- security protocols
- cryptographic protocols
- authentication protocol
- ban logic
- formal analysis
- rfid systems
- key agreement protocol
- security analysis
- security model
- key exchange protocol
- communication protocols
- security properties
- mutual authentication
- security services
- security requirements
- key management
- denial of service attacks
- information security
- key distribution
- key agreement
- key establishment
- secure routing
- elliptic curve
- provably secure
- protocol specification
- messages exchanged
- mobile payment
- virtual private network
- security threats
- secure multiparty computation
- communication protocol
- security mechanisms
- security issues
- security policies
- network security
- intrusion detection
- semi honest
- contractual obligations
- electronic voting
- access control
- key exchange
- group communication
- statistical databases
- lightweight
- cryptographic algorithms
- blind signature
- blind signature scheme
- diffie hellman
- network layer
- private key
- tcp ip
- privacy preserving