Relating Symbolic and Cryptographic Secrecy.
Michael BackesBirgit PfitzmannPublished in: IACR Cryptol. ePrint Arch. (2004)
Keyphrases
- key management
- security properties
- smart card
- security protocols
- key distribution
- ad hoc networks
- symbolic representation
- resource constrained
- wireless sensor networks
- secret key
- digital signature
- high level
- random number generator
- security requirements
- secure communication
- connectionist models
- security analysis
- real time
- symbolic description
- encryption scheme
- hash functions
- low cost
- case study
- information systems
- databases