Consensus protocol security analysis using an algebraic virtual machine.
Oleksandr A. LetychevskyiVolodymyr PeschanenkoSerhii HorbatiukPublished in: IntelITSIS (2022)
Keyphrases
- security analysis
- virtual machine
- mutual authentication
- operating system
- authentication protocol
- security requirements
- public key
- data center
- security properties
- smart card
- security model
- high security
- key exchange
- secure electronic
- encryption scheme
- user authentication
- real time
- private key
- energy consumption
- sensor networks
- data mining