An agnostic and secure interoperability protocol for seamless asset movement.
El-hacen DialloMohameden DieyeOmar DibPierre ValiorguePublished in: J. Netw. Comput. Appl. (2024)
Keyphrases
- interoperability issues
- cryptographic protocols
- covert channel
- authentication protocol
- security protocols
- key distribution
- metadata
- scalar product
- secure routing
- key agreement protocol
- key exchange protocol
- homomorphic encryption
- group communication
- security analysis
- privacy preserving
- lightweight
- key exchange
- multi party
- rfid systems
- diffie hellman
- secure multiparty computation
- provably secure
- vertically partitioned data
- secure multi party
- password authentication
- key establishment
- security properties
- electronic voting
- cryptographic algorithms
- mutual authentication
- key management
- security requirements
- security model
- standard model
- user authentication
- trusted third party
- security issues
- context awareness
- user privacy
- formal analysis
- secure communication
- routing protocol
- key agreement
- security services
- mobile agent system
- elliptic curve
- blind signature
- mobile payment
- tcp ip
- wireless medium
- information systems