Correction to: Dispelling myths on superposition attacks: formal security model and attack analyses.
Luka MusicCéline ChevalierElham KashefiPublished in: Des. Codes Cryptogr. (2022)
Keyphrases
- information systems
- security model
- countermeasures
- information security
- security requirements
- malicious users
- attack detection
- access control
- denial of service attacks
- security analysis
- public key
- security mechanisms
- attack scenarios
- ddos attacks
- security architecture
- cyber attacks
- block cipher
- data corruption
- security problems
- dos attacks
- security issues
- secret key
- computer systems
- provably secure
- intrusion detection system
- security properties
- public key cryptography
- distributed denial of service attacks
- private key
- data mining
- authentication protocol
- malicious nodes
- designated verifier