Analyzing Protocol Security Through Information-Flow Control.
N. V. Narendra KumarR. K. ShyamasundarPublished in: ICDCIT (2017)
Keyphrases
- information flow control
- information flow
- cryptographic protocols
- security protocols
- security analysis
- authentication protocol
- key exchange protocol
- denial of service attacks
- key agreement protocol
- mobile payment
- security services
- lightweight
- formal analysis
- security model
- information security
- group communication
- mobile agent system
- physical layer
- rfid systems
- supply chain
- security requirements