A plan-commit-prove protocol for secure verification of traversal path.
Subhas Kumar GhoshAmitabha GhoshPublished in: ICON (2004)
Keyphrases
- cryptographic protocols
- covert channel
- standard model
- authentication protocol
- security protocols
- scalar product
- security analysis
- protocol specification
- key exchange protocol
- security properties
- group communication
- lightweight
- formal analysis
- formal verification
- multi party
- secure routing
- shortest path
- key agreement protocol
- provably secure
- plan execution
- integrity verification
- key distribution
- plan recognition
- data structure
- high security
- password authentication
- key exchange
- model checker
- security model
- security requirements
- tree structure
- diffie hellman
- mobile agent system
- cryptographic algorithms
- rfid systems
- electronic voting
- key management
- secure multiparty computation
- model checking
- secure multi party