Secure Protocol Composition.
Anupam DattaAnte DerekJohn C. MitchellDusko PavlovicPublished in: MFPS (2003)
Keyphrases
- cryptographic protocols
- covert channel
- authentication protocol
- scalar product
- security protocols
- secure routing
- key distribution
- lightweight
- key exchange protocol
- privacy preserving
- homomorphic encryption
- group communication
- security analysis
- secure multi party
- vertically partitioned data
- provably secure
- diffie hellman
- mutual authentication
- rfid systems
- security properties
- electronic voting
- trusted third party
- security model
- multi party
- key agreement protocol
- key exchange
- key management
- cryptographic algorithms
- key agreement
- secure multiparty computation
- standard model
- security requirements
- key establishment
- mobile agent system
- user privacy
- user authentication
- web service composition
- blind signature
- tcp ip
- formal analysis
- signature scheme
- composite web services
- rfid tags
- password authentication
- blind signature scheme
- web services
- security issues
- ad hoc networks
- digital signature scheme