Tracing back attacks against encrypted protocols.
Tarik TalebZubair Md. FadlullahKazuo HashimotoYoshiaki NemotoNei KatoPublished in: IWCMC (2007)
Keyphrases
- security protocols
- cryptographic protocols
- stepping stones
- countermeasures
- security flaws
- security properties
- security mechanisms
- authentication protocol
- security threats
- communication protocols
- attack detection
- terrorist attacks
- malicious attacks
- traffic analysis
- watermarking scheme
- key management
- encryption decryption
- key distribution
- chosen plaintext