Security Agility Solution Independent of the Underlaying Protocol Architecture.
Valter VasicMiljenko MikucPublished in: AT (2012)
Keyphrases
- communication protocols
- cryptographic protocols
- security architecture
- key exchange protocol
- communication protocol
- security model
- security protocols
- formal analysis
- authentication protocol
- statistical databases
- intrusion detection
- optimal solution
- security services
- ban logic
- trusted third party
- key agreement protocol
- rfid systems
- key distribution
- security analysis
- network security
- information security
- business process
- software systems
- lightweight