Redesigning Secure Protocols to Compel Security Checks (Transcript of Discussion).
Keith IrwinPublished in: Security Protocols Workshop (2015)
Keyphrases
- security protocols
- cryptographic protocols
- key agreement protocol
- secure multiparty computation
- authentication protocol
- security services
- security properties
- key establishment
- key exchange
- key distribution
- key management
- privacy preserving
- security issues
- security requirements
- security measures
- security analysis
- security mechanisms
- session key
- security level
- diffie hellman
- semi honest
- key agreement
- data security
- mutual authentication
- security management
- wireless sensor networks
- secure communication
- security patterns
- security model
- smart card
- secret key
- public key cryptosystems
- user authentication
- group communication
- electronic voting
- communication protocols
- application level
- rfid systems
- authentication scheme
- encryption scheme
- homomorphic encryption
- security architecture
- trusted third party
- public key encryption
- data encryption
- integrity verification
- security flaws
- stream cipher
- access control
- provably secure
- high security
- identity management
- standard model
- public key
- rfid tags
- ad hoc networks
- private key
- elliptic curve
- authentication mechanism
- resource constrained
- sensitive data
- scalar product
- multi party
- information security
- intrusion detection