Keyphrases
- cryptographic protocols
- covert channel
- rfid systems
- key management
- key distribution
- authentication protocol
- security protocols
- scalar product
- secure routing
- key agreement protocol
- group communication
- security analysis
- protocol stack
- homomorphic encryption
- provably secure
- mutual authentication
- key exchange protocol
- lightweight
- multi party
- management system
- security model
- secure multi party
- privacy preserving
- cryptographic algorithms
- password authentication
- wireless sensor networks
- secure multiparty computation
- security problems
- wireless medium
- key exchange
- security mechanisms
- cloud computing
- ad hoc networks
- physical layer
- standard model
- diffie hellman
- data transmission
- security requirements
- security properties
- security issues
- vertically partitioned data
- smart card
- user privacy
- electronic voting
- security services
- trusted third party
- mobile payment
- secure communication
- noisy channel
- wireless link
- big data
- blind signature
- end to end
- key agreement
- location information
- rfid tags
- link failure
- public key
- digital signature