Security of Blind Discrete Log Signatures against Interactive Attacks.
Claus-Peter SchnorrPublished in: ICICS (2001)
Keyphrases
- security threats
- security mechanisms
- security problems
- computer security
- security measures
- malicious traffic
- security protocols
- cyber attacks
- java card
- information security
- security vulnerabilities
- countermeasures
- anti virus
- security risks
- denial of service attacks
- security issues
- malicious attacks
- digital signature
- cryptographic protocols
- stream cipher
- security flaws
- security breaches
- intrusion detection
- chosen plaintext
- security requirements
- fault injection
- access control
- network traffic
- identity theft
- intrusion detection and prevention
- information leakage
- malicious users
- malware detection
- security policies
- network security
- biometric template
- buffer overflow
- cyber security
- unauthorized access
- secure routing
- attack scenarios
- watermark extraction
- operating system
- intrusion detection system
- intrusion prevention