On the security of two ownership transfer protocols and their improvements.
Nasour BagheriSeyed Farhad AghiliMasoumeh SafkhaniPublished in: Int. Arab J. Inf. Technol. (2018)
Keyphrases
- security protocols
- security properties
- cryptographic protocols
- key agreement protocol
- communication protocols
- security services
- authentication protocol
- information security
- security policies
- key establishment
- intrusion detection
- key distribution
- security requirements
- network security
- secure multiparty computation
- statistical databases
- transfer learning
- security issues
- security threats
- messages exchanged
- application level
- security level
- access control
- security analysis
- computer security
- multi party
- security systems
- secure communication
- mutual authentication
- key management
- contractual obligations