Corrigendum to "Breaking the binding: Attacks on the Merkle approach to prove liabilities and its applications" [Computers & Security, Volume 87, 2019, 101585].
Kexin HuZhenfeng ZhangKaiwen GuoPublished in: Comput. Secur. (2020)
Keyphrases
- security threats
- security problems
- security mechanisms
- security protocols
- computer security
- cyber attacks
- security measures
- security vulnerabilities
- security breaches
- java card
- information security
- countermeasures
- security issues
- denial of service attacks
- security flaws
- chosen plaintext
- computer systems
- malicious users
- cryptographic protocols
- insider attacks
- security risks
- fault injection
- biometric template
- stream cipher
- malicious attacks
- security management
- security requirements
- key management
- intrusion detection
- cryptographic algorithms
- secure routing
- attack detection
- network security
- cyber security
- access control
- information leakage
- buffer overflow
- intrusion detection and prevention
- watermarking scheme
- unauthorized access
- denial of service
- resource constrained
- security properties
- authentication protocol
- security policies
- attack scenarios
- protection mechanisms
- identity theft
- sql injection
- security analysis
- intrusion prevention
- user authentication