عرض بسيط للتسجيلة

المؤلفChaudhry, Junaid
المؤلفQidwai, Uvais A.
المؤلفRittenhouse, Robert G.
المؤلفLee, Malrey
تاريخ الإتاحة2024-05-07T05:39:59Z
تاريخ النشر2012
اسم المنشورProceedings - 2012 International Conference on Emerging Technologies, ICET 2012
المصدرScopus
المعرّفhttp://dx.doi.org/10.1109/ICET.2012.6375433
معرّف المصادر الموحدhttp://hdl.handle.net/10576/54694
الملخصIn network security goals such as confidentiality, authentication, integrity and non-repudiation can be achieved using cryptographic techniques. Cryptographic techniques are techniques to hide information from unauthorized persons. The fact is, even when strong cryptographic algorithms and protocols are applied, the security of communication systems cannot be guaranteed [1]. Since cryptographic protocols can contain several types of flaws and vulnerabilities that can be exploited by attackers, cryptographic verification for suitability is needed to detect all possible flaws and attacks against them. In Wireless Body Area Networks (WBANs) the cryptographic implementation comes at the expense of performance and power conservation making engineering of security protocols suitable for low powered networks a challenging task. This paper will discuss the possible flaws and attacks on cryptographic protocols, verification methods to detect these flaws and investigate the implementation of these protocols in the WBANs.
اللغةen
الناشرIEEE
الموضوعattacks on cryptographic protocols
Cryptographic protocol
cryptographic protocol flaws
cryptographic verification
WBAN security
العنوانVulnerabilities and verification of cryptographic protocols and their future in Wireless Body Area Networks
النوعConference Paper
الصفحات259-263


الملفات في هذه التسجيلة

الملفاتالحجمالصيغةالعرض

لا توجد ملفات لها صلة بهذه التسجيلة.

هذه التسجيلة تظهر في المجموعات التالية

عرض بسيط للتسجيلة