Applying authentication tests to discover Man-In-The-Middle attack in security protocols.
Shahabuddin MuhammadPublished in: ICDIM (2013)
Keyphrases
- security protocols
- authentication protocol
- security services
- security mechanisms
- automated design
- secure communication
- cryptographic algorithms
- security properties
- security requirements
- key distribution
- artificial immune algorithm
- resource constrained
- key management
- security issues
- authentication scheme
- smart card
- access control
- remote attestation
- user authentication
- cryptographic protocols
- lightweight
- security analysis
- biometric authentication
- intrusion detection
- public key infrastructure
- data processing