On the Security of Beth's Identification Schemes against Active and Concurrent Adversaries.
Giovanni Di CrescenzoPublished in: MMICS (2008)
Keyphrases
- access control
- security issues
- intrusion detection
- information security
- computer security
- key management scheme
- provably secure
- network security
- key management
- security requirements
- key agreement
- data security
- security model
- security systems
- security management
- protection schemes
- risk assessment
- operating system
- security vulnerabilities
- computer networks
- security measures
- security threats
- e government
- statistical databases