A Security Analysis and Revised Security Extension for the Precision Time Protocol.
Eyal ItkinAvishai WoolPublished in: IEEE Trans. Dependable Secur. Comput. (2020)
Keyphrases
- security analysis
- mutual authentication
- security requirements
- authentication protocol
- security properties
- security model
- high security
- smart card
- public key
- secure electronic
- internet banking
- encryption scheme
- key exchange
- user authentication
- elliptic curve cryptography
- image encryption
- private key
- provably secure
- information security
- authentication scheme
- trusted third party
- encryption algorithm
- standard model
- secret key
- security policies
- defense mechanisms