Security of the DNS Protocol - Implementation and Weaknesses Analyses of DNSSEC
Kaouthar ChetiouiGhizlane OrhanouSaid El HajjiAbdelmajid LakbabiPublished in: CoRR (2012)
Keyphrases
- security protocols
- authentication protocol
- cryptographic protocols
- lightweight
- protocol specification
- security properties
- security analysis
- key agreement protocol
- provably secure
- ban logic
- key exchange protocol
- security requirements
- access control
- statistical databases
- formal analysis
- rfid systems
- security services
- denial of service attacks
- load balancing
- trusted third party
- security policies
- blind signature scheme
- key distribution
- transaction processing systems