Keyphrases
- security mechanisms
- stream cipher
- security protocols
- wireless local area network
- cryptographic protocols
- cryptographic algorithms
- security analysis
- secure routing
- denial of service attacks
- secret key
- security threats
- resource constrained
- security issues
- smart card
- access control
- operating system
- key management
- authentication protocol
- key distribution
- security requirements
- high security
- lightweight
- pseudorandom
- countermeasures
- ad hoc networks
- similarity search
- attack scenarios
- end hosts