Cloud-Based Secure Authentication (CSA) Protocol Suite for Defense against DoS Attacks.
Marwan DarwishAbdelkader H. OudaLuiz Fernando CapretzPublished in: CoRR (2017)
Keyphrases
- dos attacks
- authentication protocol
- network security
- lightweight
- secure communication
- denial of service
- key distribution
- ddos attacks
- session key
- denial of service attacks
- password authentication
- security analysis
- user authentication
- mutual authentication
- cryptographic protocols
- smart card
- key agreement protocol
- security requirements
- covert channel
- intrusion detection
- information security
- authentication scheme
- key agreement
- trusted third party
- diffie hellman
- public key
- authentication mechanism
- cloud computing
- security protocols
- security policies
- key exchange protocol
- identity management
- secret key
- key management
- computer networks
- network traffic
- intrusion detection system
- provably secure
- public key cryptography
- rfid tags
- security services
- security properties
- rfid systems
- factor authentication
- private key
- anomaly detection
- digital signature
- security model
- data encryption
- hash functions
- elliptic curve