On Establishing and Fixing a Parallel Session Attack in a Security Protocol.
Reiner DojenAnca JurcutTom CoffeyCornelia GyörödiPublished in: IDC (2008)
Keyphrases
- security protocols
- authentication protocol
- block cipher
- artificial immune algorithm
- key management
- security services
- automated design
- security measures
- cryptographic algorithms
- security mechanisms
- security properties
- parallel computing
- countermeasures
- rfid tags
- hash functions
- access control
- rfid systems
- database systems
- search engine