Secure ARP and Secure DHCP Protocols to Mitigate Security Attacks.
Biju IssacPublished in: CoRR (2014)
Keyphrases
- cryptographic protocols
- security protocols
- security measures
- security mechanisms
- security properties
- security issues
- security requirements
- stream cipher
- key agreement protocol
- authentication protocol
- secure routing
- key distribution
- security services
- key management
- security flaws
- key exchange
- security threats
- secure multiparty computation
- cryptographic algorithms
- chosen plaintext
- countermeasures
- security problems
- security management
- security level
- diffie hellman
- security analysis
- secure communication
- sensitive data
- access control
- key establishment
- privacy preserving
- smart card
- unauthorized access
- data security
- data encryption
- multi party
- authentication scheme
- semi honest
- security policies
- user authentication
- security architecture
- resource constrained
- sql injection
- rfid systems
- protection mechanisms
- electronic voting
- key exchange protocol
- security vulnerabilities
- security model
- mutual authentication
- provably secure
- network security
- intrusion detection