Security Analysis of Subterranean 2.0.
Ling SongYi TuDanping ShiLei HuPublished in: IACR Cryptol. ePrint Arch. (2020)
Keyphrases
- security analysis
- smart card
- public key
- security requirements
- high security
- security model
- image encryption
- security properties
- authentication protocol
- encryption algorithm
- encryption scheme
- data mining
- real time
- user authentication
- databases
- data access
- cost effective
- low cost
- data model
- private key
- authentication scheme