Dispelling Myths on Superposition Attacks: Formal Security Model and Attack Analyses.
Luka MusicCéline ChevalierElham KashefiPublished in: CoRR (2020)
Keyphrases
- security model
- countermeasures
- attack detection
- malicious users
- security requirements
- public key
- denial of service attacks
- access control
- information security
- attack scenarios
- security architecture
- ddos attacks
- data corruption
- cyber attacks
- security analysis
- secret key
- dos attacks
- security mechanisms
- block cipher
- security problems
- detecting malicious
- malicious nodes
- designated verifier
- security properties
- provably secure
- authentication protocol
- security issues
- security policies
- watermarking scheme
- smart card
- information systems
- intrusion detection