The Impacts of DNS Protocol Security Weaknesses.
Willian A. DimitrovGalina S. PanayotovaPublished in: J. Commun. (2020)
Keyphrases
- cryptographic protocols
- security protocols
- key agreement protocol
- ban logic
- authentication protocol
- formal analysis
- security properties
- security analysis
- security model
- key exchange protocol
- rfid systems
- mutual authentication
- denial of service attacks
- key distribution
- mobile payment
- security requirements
- key management
- secure multiparty computation
- access control
- security services
- security threats
- provably secure
- electronic voting
- key agreement
- contractual obligations
- lightweight
- application layer
- information security
- cryptographic algorithms
- physical layer
- elliptic curve
- security issues
- diffie hellman
- key exchange
- privacy preserving
- protocol specification
- mobile agent system
- communication protocols
- security problems
- security mechanisms
- network layer
- network security
- distributed systems
- secure routing
- intrusion detection
- homomorphic encryption
- messages exchanged
- trust negotiation
- security policies
- rfid tags
- trusted third party
- encryption scheme
- communication protocol