On the (in)security of IPsec in MAC-then-encrypt configurations.
Jean Paul DegabrieleKenneth G. PatersonPublished in: CCS (2010)
Keyphrases
- key management
- network security
- encryption decryption
- sensitive data
- encryption algorithm
- information security
- key exchange
- encryption scheme
- authentication protocol
- access control
- security analysis
- secret key
- intrusion detection
- key distribution
- ad hoc networks
- private key
- security issues
- security requirements
- security policies
- smart card
- multilevel secure
- security properties
- intrusion detection system
- statistical databases
- privacy preserving
- data security
- information systems