Combating Against Attacks on Encrypted Protocols.
Zubair Md. FadlullahTarik TalebNirwan AnsariKazuo HashimotoYutaka MiyakeYoshiaki NemotoNei KatoPublished in: ICC (2007)
Keyphrases
- security protocols
- cryptographic protocols
- stepping stones
- spam filters
- countermeasures
- encryption decryption
- security flaws
- authentication protocol
- spam filtering
- malicious attacks
- security mechanisms
- watermarking scheme
- security properties
- security threats
- traffic analysis
- encryption key
- attack detection
- outsourced databases
- encryption algorithm
- terrorist attacks
- search engine
- standard model
- rfid tags
- watermarking algorithm
- information security
- third party