User requirements-aware security ranking in SSL protocol.
Fang QiZhe TangGuojun WangJie WuPublished in: J. Supercomput. (2013)
Keyphrases
- user requirements
- cryptographic protocols
- security protocols
- authentication protocol
- key agreement protocol
- end users
- security model
- ranking algorithm
- security properties
- security analysis
- rfid systems
- communication protocols
- secure multi party
- ban logic
- key exchange protocol
- mobile payment
- access control
- ranking functions
- information security
- network security
- security requirements
- formal analysis
- provably secure
- semi supervised learning
- mobile agent system
- denial of service attacks
- key distribution
- elliptic curve
- mutual authentication
- electronic voting
- web search
- homomorphic encryption
- secure multiparty computation
- security policies
- lightweight
- network layer
- intrusion detection
- security mechanisms
- security issues
- smart card
- messages exchanged
- secure communication
- secure routing
- virtual private network
- protocol specification
- trusted third party
- key management
- diffie hellman
- key establishment
- mobile agents
- rfid tags
- privacy preserving
- physical layer
- contractual obligations