Relating Symbolic and Cryptographic Secrecy.
Michael BackesBirgit PfitzmannPublished in: IEEE Symposium on Security and Privacy (2005)
Keyphrases
- key management
- security properties
- security analysis
- smart card
- key distribution
- resource constrained
- wireless sensor networks
- symbolic representation
- high level
- connectionist models
- hash functions
- connectionist systems
- public key cryptography
- secure communication
- spread spectrum
- digital signature
- security protocols
- formal model
- ad hoc networks
- public key
- symbolic reasoning
- symbolic description
- cryptographic algorithms
- data sets