Retrenching the Purse: Hashing Injective CLEAR Codes, and Security Properties.
Richard BanachMichael PoppletonCzeslaw JeskeSusan StepneyPublished in: ISoLA (2006)
Keyphrases
- security properties
- hashing methods
- formal model
- security requirements
- security analysis
- security protocols
- binary codes
- cryptographic protocols
- security vulnerabilities
- data structure
- key agreement
- hamming distance
- hash functions
- security mechanisms
- formal methods
- smart card
- similarity measure
- security policies
- power consumption