Deniable Key Establishment Resistance against eKCI Attacks.
Lukasz KrzywieckiTomasz WlislockiPublished in: Secur. Commun. Networks (2017)
Keyphrases
- authentication protocol
- key establishment
- security protocols
- key management
- secret key
- cryptographic protocols
- smart card
- sensor networks
- wireless sensor networks
- resource constrained
- security mechanisms
- ad hoc networks
- pairwise
- public key
- secure communication
- key distribution
- provably secure
- elliptic curve
- watermarking scheme
- pseudorandom
- security analysis
- rfid tags
- security properties
- ciphertext
- lightweight
- sensor data
- computer systems
- sensor nodes
- hash functions
- query processing