Methodological Security Verification of a Registration Protocol.
Jesus DiazDavid ArroyoFrancisco de Borja RodríguezPublished in: SOCO-CISIS-ICEUTE (2014)
Keyphrases
- cryptographic protocols
- protocol specification
- formal analysis
- ban logic
- security protocols
- authentication protocol
- high security
- security properties
- image registration
- security analysis
- key exchange protocol
- key agreement protocol
- communication protocols
- standard model
- java card
- elliptic curve
- key distribution
- mutual authentication
- denial of service attacks
- rfid systems
- model checker
- model checking
- point cloud
- security requirements
- security model
- key management
- integrity verification
- lightweight
- information security
- secure multiparty computation
- key establishment
- provably secure
- access control
- group communication
- network layer
- application layer
- statistical databases
- formal methods
- key agreement
- contractual obligations
- intrusion detection
- secure routing
- network security
- public key
- messages exchanged
- physical layer
- security mechanisms
- trust negotiation
- mobile payment
- key exchange