Login / Signup
A Survey on Applications of H-Technique: Revisiting Security Analysis of PRP and PRF.
Ashwin Jha
Mridul Nandi
Published in:
Entropy (2022)
Keyphrases
</>
security analysis
pseudo relevance feedback
query expansion
smart card
security requirements
public key
high security
security model
image encryption
document retrieval
encryption scheme
authentication protocol
encryption algorithm
user authentication
security properties
mutual authentication
proxy signature scheme
cost effective
databases
similarity search