Impersonation attack identification for secure communication.
Mustafa Harun YilmazHüseyin ArslanPublished in: GLOBECOM Workshops (2013)
Keyphrases
- secure communication
- smart card
- secret key
- authentication protocol
- key exchange protocol
- security protocols
- diffie hellman
- security analysis
- digital signature
- information security
- public key
- security requirements
- secret sharing
- security mechanisms
- key management
- network security
- key distribution
- low cost
- encryption scheme
- hash functions
- bit rate