Secure protocol composition.
Anupam DattaAnte DerekJohn C. MitchellDusko PavlovicPublished in: FMSE (2003)
Keyphrases
- cryptographic protocols
- covert channel
- authentication protocol
- scalar product
- security protocols
- secure routing
- key exchange protocol
- group communication
- key distribution
- security analysis
- lightweight
- multi party
- key agreement protocol
- vertically partitioned data
- mutual authentication
- provably secure
- diffie hellman
- password authentication
- security properties
- homomorphic encryption
- cryptographic algorithms
- secure multi party
- privacy preserving
- standard model
- rfid systems
- security requirements
- secure multiparty computation
- electronic voting
- user privacy
- security model
- trusted third party
- authentication scheme
- user authentication
- key establishment
- key exchange
- encryption scheme
- web service composition
- formal analysis
- key agreement
- protocol stack
- blind signature
- privacy protection
- public key cryptosystems
- wireless medium
- mobile agent system
- rfid tags
- semi honest
- composite web services
- public key
- security services
- secure communication