Security analysis of a protocol for pollution attack detection.
Kiattikul SooksomsatarnIan WelchWinston Khoon Guan SeahPublished in: LCN (2013)
Keyphrases
- security analysis
- attack detection
- mutual authentication
- multistage
- authentication protocol
- public key
- smart card
- intrusion detection system
- security properties
- security requirements
- encryption scheme
- secure electronic
- cyber attacks
- user authentication
- product recommendation
- real time
- databases
- network security
- intrusion detection
- data analysis