Security flaw of Hölbl et al.'s protocol.
Jorge MunillaAlberto PeinadoPublished in: Comput. Commun. (2009)
Keyphrases
- cryptographic protocols
- security protocols
- blind signature scheme
- authentication protocol
- key agreement protocol
- key exchange protocol
- security analysis
- security properties
- security model
- rfid systems
- ban logic
- blind signature
- denial of service attacks
- formal analysis
- provably secure
- communication protocols
- mutual authentication
- security issues
- mobile payment
- information security
- secure multiparty computation
- statistical databases
- cryptographic algorithms
- access control
- lightweight
- intrusion detection
- network layer
- group communication
- secure routing
- privacy preserving
- key distribution
- diffie hellman
- protocol specification
- messages exchanged
- key establishment
- electronic voting
- security requirements
- public key
- security threats
- homomorphic encryption
- key management
- mobile agent system
- security services
- security problems
- security mechanisms
- network security
- smart card
- trusted third party
- elliptic curve
- application layer
- key exchange
- semi honest