Security loopholes in the controlled quantum dialogue robust against conspiring users protocol.
Zhihao LiuHanwu ChenPublished in: Quantum Inf. Process. (2019)
Keyphrases
- cryptographic protocols
- user privacy
- recommender systems
- authentication protocol
- security protocols
- key exchange protocol
- security properties
- user interface
- formal analysis
- key distribution
- spoken dialogue systems
- end users
- intrusion detection
- mutual authentication
- denial of service attacks
- rfid systems
- lightweight
- protocol specification
- provably secure
- communication protocols
- security model
- access control
- security analysis
- personal data
- dialogue system
- mobile services
- security policies
- network security
- information security