Preventing type flaw attacks on security protocols with a simplified tagging scheme.
Yafen LiWuu YangChing-Wei HuangPublished in: ISICT (2004)
Keyphrases
- security protocols
- secure communication
- authentication protocol
- cryptographic algorithms
- automated design
- security services
- security mechanisms
- security properties
- artificial immune algorithm
- key management
- cryptographic protocols
- secret sharing scheme
- elliptic curve cryptography
- authentication scheme
- real time
- security analysis
- security requirements
- sensor networks
- metadata
- data mining