Optimality Results on the Security of Lookup-Based Protocols.
Sjouke MauwJorge Toro-PozoRolando Trujillo-RasuaPublished in: RFIDSec (2016)
Keyphrases
- security protocols
- communication protocols
- cryptographic protocols
- security properties
- security services
- authentication protocol
- key agreement protocol
- key distribution
- security policies
- information security
- key management
- security requirements
- security problems
- security issues
- key exchange
- secure multiparty computation
- application level
- security systems
- intrusion detection
- access control
- optimal solution
- standard model
- high security
- messages exchanged
- computer security
- security level
- information systems
- security analysis
- multi party
- rfid tags
- personal information
- mutual authentication
- privacy preserving
- database systems