Keyphrases
- wireless local area network
- authentication protocol
- security analysis
- ban logic
- key agreement protocol
- mutual authentication
- session key
- wireless networks
- key distribution
- virtual private network
- security requirements
- formal analysis
- key agreement
- secret key
- security protocols
- cryptographic protocols
- medium access control
- security model
- security services
- user authentication
- smart card
- public key
- security properties
- encryption decryption
- authentication mechanism
- security mechanisms
- elliptic curve cryptography
- elliptic curve
- diffie hellman
- trusted third party
- password authentication
- authentication scheme
- trust negotiation
- physical layer
- provably secure
- key management
- access points
- public key cryptography
- identity authentication
- key exchange protocol
- wireless communication
- information security
- mobile devices
- network access
- rfid systems
- rfid tags
- ad hoc networking
- lightweight
- secure communication
- private key
- protocol stack
- data encryption
- wireless local area networks
- encryption scheme
- multi hop
- security policies
- mobility management
- mac protocol