Computational Soundness of Coinductive Symbolic Security under Active Attacks.
Mohammad HajiabadiBruce M. KapronPublished in: IACR Cryptol. ePrint Arch. (2012)
Keyphrases
- security threats
- security mechanisms
- security problems
- java card
- computer security
- cyber attacks
- chosen plaintext
- security measures
- denial of service attacks
- security breaches
- security protocols
- security issues
- security risks
- security vulnerabilities
- countermeasures
- fault injection
- malicious attacks
- security requirements
- malicious users
- network security
- access control
- security flaws
- cryptographic algorithms
- stream cipher
- intrusion detection
- smart card
- information security
- cryptographic protocols
- intrusion prevention
- information leakage
- security policies
- buffer overflow
- insider attacks
- watermarking technique
- key management
- watermarking scheme
- biometric template
- security analysis