Login / Signup

Hyper-Encryption: Eternal Secrecy Using the Bounded Storage and Limited Access Models.

Vik PantWilliam P. Wagner
Published in: Inf. Secur. J. A Glob. Perspect. (2013)
Keyphrases
  • statistical models
  • prior knowledge
  • probabilistic model
  • random access
  • secondary storage
  • database
  • complex systems
  • third party
  • key management
  • security analysis
  • security properties