Can Formal Security Verification Really Be Optional? Scrutinizing the Security of IMD Authentication Protocols.
Daniel Gerbi DugumaIlsun YouYonas Engida GebremariamJiyoon KimPublished in: Sensors (2021)
Keyphrases
- authentication protocol
- formal analysis
- ban logic
- cryptographic protocols
- security analysis
- information security
- high security
- intrusion detection
- rfid systems
- security protocols
- rfid tags
- access control
- security requirements
- key management
- security problems
- security issues
- network security
- lightweight
- security properties
- smart card
- security policies
- key distribution
- user authentication
- security mechanisms
- sensitive data
- public key
- hash functions
- operating system