On the Security Analysis of a Cooperative Incremental Relaying Protocol in the Presence of an Active Eavesdropper.
Saeed VahidianSajad HatamniaBenoît ChampagnePublished in: CoRR (2018)
Keyphrases
- security analysis
- cooperative
- mutual authentication
- authentication protocol
- security model
- public key
- smart card
- security properties
- security requirements
- secure electronic
- high security
- key exchange
- user authentication
- encryption scheme
- encryption algorithm
- multi agent systems
- multi agent
- lightweight
- access control
- private key
- information systems