A Survey on Applications of H-Technique: Revisiting Security Analysis of PRP and PRF.
Ashwin JhaMridul NandiPublished in: Entropy (2022)
Keyphrases
- security analysis
- pseudo relevance feedback
- query expansion
- smart card
- security requirements
- public key
- high security
- security model
- image encryption
- document retrieval
- encryption scheme
- authentication protocol
- encryption algorithm
- user authentication
- security properties
- mutual authentication
- proxy signature scheme
- cost effective
- databases
- similarity search