Formalizing and Analyzing the Needham-Schroeder Symmetric-Key Protocol by Rewriting.
Monica NesiGiuseppina RucciPublished in: Electron. Notes Theor. Comput. Sci. (2005)
Keyphrases
- public key
- symmetric key
- security analysis
- public key cryptography
- diffie hellman
- authentication protocol
- security model
- security protocols
- key establishment
- secret key
- encryption scheme
- digital signature
- provably secure
- key management
- signature scheme
- private key
- secure communication
- security properties
- rfid tags
- lightweight
- database systems
- intrusion detection
- encryption algorithm
- low cost
- sensor networks