Secrecy for Bounded Security Protocols without Freshness Check.
Catalin V. BîrjoveanuPublished in: SECURWARE (2009)
Keyphrases
- security protocols
- security properties
- key management
- key distribution
- cryptographic algorithms
- automated design
- response time
- security services
- artificial immune algorithm
- wireless sensor networks
- secure communication
- security mechanisms
- resource constrained
- security requirements
- ad hoc networks
- cryptographic protocols
- formal model
- fault tolerance
- security analysis
- elliptic curve
- digital signature
- secret key
- intrusion detection