Protocol Independence through Disjoint Encryption.
Joshua D. GuttmanF. Javier ThayerPublished in: CSFW (2000)
Keyphrases
- cryptographic protocols
- security properties
- mutual authentication
- key exchange
- security analysis
- provably secure
- cryptographic algorithms
- key management
- security protocols
- communication protocol
- lightweight
- virtual private network
- public key cryptography
- image encryption
- encryption algorithm
- pairwise
- tcp ip
- authentication protocol
- encryption scheme
- encryption algorithms
- secure communication
- diffie hellman
- public key
- high security
- distributed databases
- conditional independence
- rfid tags
- security requirements
- random number
- key distribution
- formal analysis
- security model