EM Probes Characterisation for Security Analysis.
Benjamin MounierAnne-Lise RibottaJacques J. A. FournierMichel AgoyanAssia TriaPublished in: Cryptography and Security (2012)
Keyphrases
- security analysis
- expectation maximization
- smart card
- public key
- security requirements
- security properties
- high security
- security model
- authentication protocol
- mutual authentication
- authentication scheme
- user authentication
- image encryption
- encryption algorithm
- unsupervised learning
- databases
- proxy signature scheme
- private key
- power consumption
- data management
- low cost
- data model