New attacks and security model of the secure flash disk.
An WangZheng LiXianwen YangYanyan YuPublished in: Math. Comput. Model. (2013)
Keyphrases
- security model
- security requirements
- security mechanisms
- disk drives
- security architecture
- security analysis
- access control
- security problems
- public key
- security protocols
- provably secure
- smart card
- public key cryptography
- information security
- storage systems
- watermarking scheme
- security properties
- cryptographic protocols
- encryption scheme
- digital signature
- key exchange
- security issues
- low cost
- authentication and key agreement
- standard model
- resource constrained
- security policies
- software architecture
- similarity search
- image compression