Redesigning Secure Protocols to Compel Security Checks.
Keith IrwinPublished in: Security Protocols Workshop (2015)
Keyphrases
- security protocols
- cryptographic protocols
- key agreement protocol
- secure multiparty computation
- key exchange
- authentication protocol
- security properties
- security services
- key distribution
- key establishment
- security requirements
- privacy preserving
- key management
- security mechanisms
- security issues
- security analysis
- semi honest
- mutual authentication
- security measures
- security level
- key agreement
- session key
- secret key
- diffie hellman
- security architecture
- data encryption
- security management
- data security
- sensitive data
- user authentication
- private key
- homomorphic encryption
- stream cipher
- information security
- digital signature scheme
- application level
- wireless sensor networks
- smart card
- security patterns
- group communication
- public key encryption
- communication protocols
- access control
- rfid tags
- authentication scheme
- secure communication
- identity management
- intrusion detection
- multi party
- public key
- security model
- authentication mechanism
- electronic voting
- trusted third party
- key exchange protocol
- rfid systems
- electronic payment
- high security
- integrity verification
- network security
- unauthorized access
- digital rights management