A cloud-based secure authentication (CSA) protocol suite for defense against Denial of Service (DoS) attacks.
Marwan DarwishAbdelkader H. OudaLuiz Fernando CapretzPublished in: J. Inf. Secur. Appl. (2015)
Keyphrases
- dos attacks
- authentication protocol
- denial of service
- network security
- lightweight
- key distribution
- ddos attacks
- password authentication
- denial of service attacks
- security analysis
- mutual authentication
- smart card
- cryptographic protocols
- key agreement protocol
- information security
- security protocols
- intrusion detection
- security mechanisms
- trusted third party
- key agreement
- security requirements
- network traffic
- intrusion detection system
- computer networks
- secret key
- public key
- security policies
- key management
- rfid tags
- response time
- cloud computing
- elliptic curve
- security issues
- security properties
- third party
- anomaly detection
- diffie hellman
- intelligent agents
- computer systems
- access control