Security Analysis of DoS Vulnerability in Stream Authentication Schemes Using Hash Chaining.
Namhi KangChristoph RulandPublished in: IEICE Trans. Commun. (2005)
Keyphrases
- security analysis
- public key
- denial of service
- security requirements
- authentication protocol
- user authentication
- smart card
- security model
- dos attacks
- high security
- provably secure
- elliptic curve cryptography
- image encryption
- security properties
- encryption scheme
- authentication scheme
- data streams
- mutual authentication
- hash functions
- public key cryptography
- encryption algorithm
- private key
- network security
- data structure
- security mechanisms
- cost effective
- information systems