A Security-Centric Comparative Study of PLEASE with Existing GKM Protocols.
V. Rhymend UthariarajT. C. RangarajanS. SrinivasanPublished in: CNSR (2007)
Keyphrases
- comparative study
- security protocols
- key agreement protocol
- security properties
- communication protocols
- cryptographic protocols
- authentication protocol
- secure multiparty computation
- security services
- information security
- statistical databases
- security requirements
- security analysis
- computer security
- security threats
- privacy preserving
- intrusion detection
- key exchange
- messages exchanged
- key distribution
- application level
- security issues
- security policies
- access control
- security systems
- security problems
- security mechanisms
- user centric
- network security
- semi honest
- security level
- security model
- cyber security
- high security
- mutual authentication
- medium access control