A Secure TCP Connection Migration Protocol to Enable the Survivability of Client-Server Applications under Malicious Attack.
Indrajit RaySonja TidemanPublished in: J. Netw. Syst. Manag. (2004)
Keyphrases
- client server
- authentication protocol
- key exchange protocol
- cryptographic protocols
- key distribution
- secret key
- diffie hellman
- smart card
- key agreement
- security protocols
- database server
- distributed databases
- mobile agents
- tcp ip
- lightweight
- security analysis
- client server architecture
- key agreement protocol
- database architectures
- public key
- peer to peer
- visual basic
- semi honest
- databases
- transport protocol
- application programming interface
- rfid tags
- communication networks
- sensitive data
- privacy preserving
- data mining
- database
- visual basic database programming