Login / Signup
Symmetry in Security Protocol Cryptographic Messages - A Serious Weakness Exploitable by Parallel Session Attacks.
Anca Jurcut
Tom Coffey
Reiner Dojen
Published in:
ARES (2012)
Keyphrases
</>
security protocols
cryptographic algorithms
security properties
security services
cryptographic protocols
key management
authentication protocol
email
artificial immune algorithm
security requirements
security mechanisms
ad hoc networks
block cipher