Secure Logging with Security Against Adaptive Crash Attack.
Sepideh AvizhehReihaneh Safavi-NainiShuai LiPublished in: FPS (2019)
Keyphrases
- security measures
- key exchange protocol
- authentication mechanism
- authentication protocol
- security requirements
- security management
- security issues
- countermeasures
- security mechanisms
- security level
- data encryption
- key agreement
- information leakage
- block cipher
- secret key
- information security
- security analysis
- stream cipher
- security architecture
- security threats
- data security
- key management
- security services
- security policies
- security protocols
- sensitive data
- access control
- key exchange
- cryptographic protocols
- security patterns
- electronic voting
- identity management
- cyber attacks
- smart card
- security model
- key agreement protocol
- intrusion detection
- diffie hellman
- encryption algorithm
- computer security
- encryption decryption
- factor authentication
- security properties
- user authentication
- security vulnerabilities
- provably secure
- trusted computing
- secure communication
- key distribution
- attack scenarios
- network security
- intrusion detection system