Secure ARP and Secure DHCP Protocols to Mitigate Security Attacks.
Biju IssacPublished in: Int. J. Netw. Secur. (2009)
Keyphrases
- security protocols
- cryptographic protocols
- security mechanisms
- security measures
- security services
- security properties
- stream cipher
- authentication protocol
- key management
- security requirements
- cryptographic algorithms
- key agreement protocol
- security issues
- secure routing
- key distribution
- secure multiparty computation
- security flaws
- key exchange
- key establishment
- security threats
- security level
- security problems
- user authentication
- countermeasures
- security analysis
- secure communication
- data encryption
- group communication
- security architecture
- data security
- sensitive data
- information security
- integrity verification
- diffie hellman
- chosen plaintext
- unauthorized access
- security vulnerabilities
- authentication scheme
- key exchange protocol
- rfid systems
- security management
- privacy preserving
- standard model
- smart card
- ad hoc networks
- multi party
- access control
- intrusion detection system
- protection mechanisms
- electronic voting
- public key
- resource constrained
- computer security
- information leakage
- security model
- wireless sensor networks