Security Proof of the Original SOK-IBS Scheme.
Xiao-Ming LuDengguo FengPublished in: Int. J. Netw. Secur. (2007)
Keyphrases
- protection scheme
- security analysis
- digital signature scheme
- authentication protocol
- intrusion detection
- authentication mechanism
- elliptic curve
- key distribution
- authentication scheme
- chosen plaintext
- reversible data embedding
- ring signature scheme
- diffie hellman
- secure communication
- theorem prover
- information security
- private key
- security level
- security model
- high security
- key exchange
- security requirements
- elliptic curve cryptography
- statistical databases
- key agreement
- privacy preserving
- wireless sensor networks