An Attack Against Message Authentication in the ERTMS Train to Trackside Communication Protocols.
Tom ChothiaMihai OrdeanJoeri de RuiterRichard J. ThomasPublished in: AsiaCCS (2017)
Keyphrases
- communication protocols
- authentication mechanism
- authentication protocol
- communication protocol
- data encryption
- user authentication
- trust relationships
- smart card
- digital watermarking
- security analysis
- secret key
- protocol stack
- wireless sensor networks
- social networks
- image authentication
- data processing
- key exchange protocol
- key agreement
- protocol specification