Comments on "On the Security of Three-Party Cryptographic Protocs" by Xu, Zhang and Zhu.
Siaw-Lynn NgPublished in: ACM SIGOPS Oper. Syst. Rev. (1999)
Keyphrases
- security protocols
- security properties
- key management
- encryption decryption
- smart card
- information security
- encryption scheme
- fuzzy vault
- cryptographic protocols
- security requirements
- secure communication
- stream cipher
- random number generator
- security issues
- access control
- computer security
- intrusion detection
- security analysis
- secret key
- cryptographic algorithms
- security policies
- security mechanisms
- security level
- high assurance
- encryption key
- digital signature
- elliptic curve cryptography
- hash functions
- security problems
- security threats
- biometric data
- security services
- homomorphic encryption
- security model
- high security
- user authentication
- encryption algorithm
- information systems
- authentication protocol
- data integrity
- sensitive data
- countermeasures
- network security
- social media