An Improvement Crypton Protocol with Higher Security Margin.
Xiaoying WangDanqi ChenQingjie LiuLing BaiPublished in: J. Networks (2014)
Keyphrases
- security protocols
- cryptographic protocols
- authentication protocol
- key agreement protocol
- security analysis
- communication protocols
- security model
- key exchange protocol
- rfid systems
- security properties
- access control
- denial of service attacks
- security requirements
- provably secure
- secure multiparty computation
- elliptic curve
- mobile payment
- intrusion detection
- diffie hellman
- lightweight
- mutual authentication
- physical layer
- virtual private network
- security services
- training set
- information security
- security policies
- security issues
- electronic voting
- key agreement
- messages exchanged
- protocol specification
- secure routing
- medium access control
- contractual obligations
- secure communication
- mobile agent system
- security problems
- tcp ip
- key distribution
- encryption scheme
- trusted third party
- cryptographic algorithms
- dos attacks
- application layer
- key management
- formal analysis
- ban logic
- wireless networks