Login / Signup
Hyper-Encryption: Eternal Secrecy Using the Bounded Storage and Limited Access Models.
Vik Pant
William P. Wagner
Published in:
Inf. Secur. J. A Glob. Perspect. (2013)
Keyphrases
</>
statistical models
prior knowledge
probabilistic model
random access
secondary storage
database
complex systems
third party
key management
security analysis
security properties