A Parameterized Analysis of Public-Key Protocols: Needham-Schroeder and Kerberos-5.
Shahabuddin MuhammadZeeshan FurqanRatan K. GuhaPublished in: ICON (2006)
Keyphrases
- public key
- authentication protocol
- security analysis
- secret key
- security model
- public key cryptosystem
- digital signature
- image authentication
- public key cryptography
- signature scheme
- authentication scheme
- encryption scheme
- session key
- diffie hellman
- user authentication
- blind signature scheme
- private key
- key distribution
- secure communication
- digital images
- public key infrastructure
- elliptic curve cryptography
- rfid tags