On the Security of Ping-Pong Protocols
Danny DolevShimon EvenRichard M. KarpPublished in: Inf. Control. (1982)
Keyphrases
- ping pong
- security protocols
- cryptographic protocols
- communication protocols
- key agreement protocol
- authentication protocol
- security properties
- security services
- information security
- network security
- security requirements
- security problems
- application level
- key exchange
- security analysis
- computer security
- messages exchanged
- key distribution
- security level
- key management
- security threats
- key establishment
- statistical databases
- access control
- protocol specification
- wireless sensor networks
- contractual obligations
- security systems
- security mechanisms
- resource constrained
- security policies