Designing & verifying secure protocols of the digital marketplace.
Swee Keow GooJames M. IrvineAllan TomlinsonScarlet Schwiderski-GroschePublished in: ISWCS (2005)
Keyphrases
- cryptographic protocols
- security protocols
- key distribution
- key exchange
- multi party
- key agreement protocol
- authentication protocol
- security properties
- group communication
- key establishment
- application level
- communication protocols
- digital curves
- digital content
- security services
- security requirements
- homomorphic encryption
- secure multiparty computation
- user authentication
- identity management
- security analysis
- trusted third party