Authentication without Elision: Partially Specified Protocols, Associated Data, and Cryptographic Models Described by Code.
Phillip RogawayTill StegersPublished in: CSF (2009)
Keyphrases
- accurate models
- experimental data
- data sets
- data processing
- data analysis
- training data
- prior knowledge
- historical data
- data collection
- database
- raw data
- statistical methods
- data distribution
- statistical analysis
- computer systems
- knowledge discovery
- data sources
- data structure
- input data
- data quality
- security protocols