Designing a secure e-tender submission protocol.
Rong DuErnest FooColin BoydPublished in: Electron. Commer. Res. (2008)
Keyphrases
- security analysis
- cryptographic protocols
- covert channel
- authentication protocol
- mutual authentication
- security requirements
- security protocols
- scalar product
- key distribution
- security model
- key exchange protocol
- lightweight
- key exchange
- key agreement protocol
- security properties
- homomorphic encryption
- public key
- group communication
- secure routing
- multi party
- smart card
- diffie hellman
- contract net protocol
- provably secure
- user authentication
- secure multi party
- trusted third party
- key establishment
- private key
- rfid systems
- encryption scheme
- password authentication
- privacy preserving
- secure multiparty computation
- security services
- standard model
- key agreement
- vertically partitioned data
- mobile agent system
- cryptographic algorithms
- user privacy
- multi agent systems
- secret key
- secure communication
- wireless medium
- key management
- digital signature scheme