Keyphrases
- secure electronic
- mobile payment
- security requirements
- cryptographic protocols
- authentication protocol
- trusted third party
- security protocols
- lightweight
- security mechanisms
- security analysis
- key agreement protocol
- concurrency control protocols
- security model
- high security
- communication protocols
- information security
- security policies
- mutual authentication
- key exchange protocol
- security properties
- access control
- commit protocols
- formal analysis
- credit card
- payment protocol
- denial of service attacks
- database
- electronic transactions
- rfid systems
- security issues
- diffie hellman
- smart card
- database transactions
- physical layer
- key distribution
- homomorphic encryption
- locking protocol
- network security
- secure routing
- virtual private network
- electronic commerce
- deadlock free
- protocol specification
- rfid tags
- provably secure
- correctness criterion
- transaction model
- distributed databases
- electronic voting
- transaction management
- privacy preserving
- secure multiparty computation
- key management
- security services
- network management
- key agreement
- messages exchanged
- scalar product