Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol.
Dusko PavlovicCatherine A. MeadowsPublished in: MFPS (2010)
Keyphrases
- authentication protocol
- ban logic
- key agreement protocol
- security analysis
- mutual authentication
- virtual private network
- formal analysis
- key distribution
- session key
- key agreement
- security protocols
- security requirements
- security services
- user authentication
- cryptographic protocols
- secret key
- authentication mechanism
- public key
- smart card
- password authentication
- security mechanisms
- trust negotiation
- trusted third party
- authentication scheme
- security model
- key management
- security properties
- wireless local area network
- encryption decryption
- rfid tags
- diffie hellman
- fuzzy vault
- lightweight
- identity authentication
- privacy protection
- elliptic curve
- data encryption
- private key
- key exchange protocol
- rfid systems
- security issues
- authentication systems
- integrity verification
- provably secure
- high security
- secure communication
- denial of service attacks
- messages exchanged
- key exchange
- access control
- hash functions
- communication protocols
- biometric authentication
- public key cryptography
- digital signature
- security level
- biometric template
- blind signature scheme
- factor authentication
- biometric data
- wireless networks