Keyphrases
- cryptographic protocols
- security properties
- security analysis
- key exchange
- mutual authentication
- cryptographic algorithms
- lightweight
- security protocols
- virtual private network
- application layer
- encryption algorithms
- elliptic curve
- network protocols
- encryption algorithm
- coloured petri nets
- elliptic curve cryptography
- communication protocol
- authentication protocol
- key management
- encryption scheme
- public key
- secure communication
- public key cryptography
- trusted third party
- security model
- formal analysis