Usability and security of out-of-band channels in secure device pairing protocols.
Ronald KaindaIvan FlechaisA. W. RoscoePublished in: SOUPS (2009)
Keyphrases
- security protocols
- cryptographic protocols
- key agreement protocol
- authentication protocol
- security properties
- security services
- secure multiparty computation
- key distribution
- key establishment
- key exchange
- security requirements
- key management
- security issues
- rfid tags
- diffie hellman
- security analysis
- mutual authentication
- privacy preserving
- security mechanisms
- security measures
- security level
- security model
- key agreement
- semi honest
- smart card
- security architecture
- application level
- data encryption
- session key
- electronic voting
- security management
- provably secure
- authentication mechanism
- stream cipher
- remote server
- key exchange protocol
- homomorphic encryption
- private key
- group communication
- public key
- wireless sensor networks
- user authentication
- public key cryptosystems
- secure communication
- information security
- data security
- security patterns
- authentication scheme
- rfid systems
- standard model
- trusted third party
- encryption scheme
- resource constrained
- sensitive data
- security flaws
- high security
- digital signature
- frequency band
- multi party
- hash functions
- ad hoc networks