Revisiting the Security of Qian et al.'s Revised Tree- $$\hbox {LSHB}^+$$ LSHB + Protocol.
Xinyu LiJing XuZhenfeng ZhangPublished in: Wirel. Pers. Commun. (2019)
Keyphrases
- cryptographic protocols
- security protocols
- blind signature scheme
- authentication protocol
- security analysis
- ban logic
- communication protocols
- blind signature
- denial of service attacks
- rfid systems
- key agreement protocol
- key exchange protocol
- security properties
- security model
- mutual authentication
- formal analysis
- information security
- security requirements
- tree structure
- provably secure
- electronic voting
- protocol specification
- key agreement
- security problems
- access control
- secure routing
- virtual private network
- physical layer
- lightweight
- intrusion detection
- mobile payment
- statistical databases
- security threats
- security services
- mobile agent system
- secure multiparty computation
- cryptographic algorithms
- trust negotiation
- security policies
- homomorphic encryption
- b tree
- key distribution
- security issues
- diffie hellman
- security mechanisms
- network security
- index structure
- key exchange
- key establishment
- anomaly detection
- encryption scheme
- sensor networks
- key management