Analyzed and Improved on the Security of IKE Protocol.
Longjun ZhangShifeng WangPublished in: MUE (2009)
Keyphrases
- cryptographic protocols
- security protocols
- security analysis
- ban logic
- authentication protocol
- key agreement protocol
- formal analysis
- rfid systems
- security properties
- communication protocols
- security model
- lightweight
- security services
- key exchange protocol
- mutual authentication
- electronic voting
- access control
- elliptic curve
- security policies
- intrusion detection
- communication protocol
- key establishment
- network management
- statistical databases
- denial of service attacks
- diffie hellman
- provably secure
- blind signature
- sensor networks
- protocol specification
- key agreement
- smart card
- information security
- blind signature scheme
- network security
- rfid tags
- security issues
- key distribution
- security requirements