On the Security of HB# against a Man-in-the-Middle Attack.
Khaled OuafiRaphael OverbeckSerge VaudenayPublished in: ASIACRYPT (2008)
Keyphrases
- information security
- security issues
- intrusion detection
- security systems
- security requirements
- computer security
- network security
- risk analysis
- security properties
- information assurance
- control system
- security threats
- security level
- functional requirements
- security vulnerabilities
- security problems
- security model
- data sets
- statistical databases
- security policies
- information systems