Keyphrases
- cryptographic protocols
- scalar product
- secure multi party computation
- lightweight
- covert channel
- security protocols
- authentication protocol
- data encryption
- multi party
- security analysis
- password authentication
- secure routing
- cost effective
- key distribution
- computer systems
- case study
- security properties
- formal analysis
- tcp ip
- security architecture
- provably secure
- digital rights management
- security model
- cryptographic algorithms
- distributed databases
- private information retrieval