Countering jamming attacks against an authentication and key agreement protocol for mobile satellite communications.
Ioana LascReiner DojenTom CoffeyPublished in: Comput. Electr. Eng. (2011)
Keyphrases
- authentication and key agreement
- security problems
- session key
- cryptographic protocols
- public key cryptography
- security protocols
- secret key
- group communication
- public key
- mobile devices
- security model
- authentication protocol
- countermeasures
- computer networks
- diffie hellman
- lightweight
- elliptic curve
- security mechanisms
- security issues
- computing environments
- communication networks
- secure communication
- security requirements
- data security
- watermarking scheme
- smart card