Parsing ambiguities in authentication and key establishment protocols.
Liqun ChenChris J. MitchellPublished in: IACR Cryptol. ePrint Arch. (2008)
Keyphrases
- key establishment
- symmetric key
- security analysis
- key management
- wireless sensor networks
- sensor networks
- security requirements
- data protection
- key distribution
- pairwise
- public key
- security protocols
- public key cryptography
- security mechanisms
- secret key
- encryption algorithm
- key establishment protocol
- secure communication
- encryption scheme
- authentication protocol
- resource constrained
- smart card
- diffie hellman
- security properties
- digital signature
- ad hoc networks
- security model
- elliptic curve
- access control
- security policies
- digital libraries
- sensor data
- fault tolerant
- group communication
- security services
- provably secure
- low cost
- data streams
- information systems