How Secure and Quick is QUIC? Provable Security and Performance Analyses.
Robert LychevSamuel JeroAlexandra BoldyrevaCristina Nita-RotaruPublished in: IACR Cryptol. ePrint Arch. (2015)
Keyphrases
- security issues
- security requirements
- security measures
- security mechanisms
- security level
- key management
- security management
- security architecture
- security protocols
- cryptographic protocols
- sensitive data
- information security
- security properties
- security analysis
- security services
- data security
- data encryption
- authentication protocol
- integrity verification
- key exchange protocol
- encryption scheme
- security model
- diffie hellman
- security patterns
- identity management
- key agreement protocol
- public key encryption
- electronic voting
- private key
- stream cipher
- authentication mechanism
- digital signature scheme
- access control
- intrusion detection
- user authentication
- key distribution
- rfid systems
- mobile agent system
- key agreement
- security policies
- electronic payment
- high security
- key exchange
- digital rights management
- digital signature
- public key
- previously mentioned
- authentication scheme
- smart card
- privacy preserving
- unauthorized access
- countermeasures
- trusted computing
- secure multiparty computation
- secure communication
- chosen plaintext
- homomorphic encryption
- public key infrastructure
- key management scheme
- cloud computing
- wireless sensor networks
- rfid tags