networks with security-aware Aloha protocol.
Xiaochen LiYuanyu ZhangYulong ShenXiaohong JiangPublished in: IET Commun. (2020)
Keyphrases
- security protocols
- network protocols
- cryptographic protocols
- security properties
- authentication protocol
- key agreement protocol
- security analysis
- security model
- key exchange protocol
- communication protocols
- ns simulator
- rfid systems
- network security
- denial of service attacks
- wide area network
- social networks
- network structure
- security issues
- computer networks
- security policies
- intrusion detection
- key distribution
- ad hoc networks
- group communication
- mac protocol
- diffie hellman
- security requirements
- internet protocol
- information security
- formal analysis
- smart card
- anti collision
- secure multiparty computation
- key agreement
- electronic voting
- virtual private network
- mutual authentication
- secure routing
- underwater acoustic
- mobile payment
- provably secure
- physical layer
- tcp ip
- wireless ad hoc networks
- routing protocol
- wireless networks
- lightweight