Computational Soundness of Coinductive Symbolic Security under Active Attacks.
Mohammad HajiabadiBruce M. KapronPublished in: TCC (2013)
Keyphrases
- security threats
- computer security
- security problems
- security mechanisms
- cyber attacks
- security protocols
- denial of service attacks
- java card
- security breaches
- security vulnerabilities
- security measures
- fault injection
- security issues
- chosen plaintext
- cryptographic protocols
- information security
- countermeasures
- secure routing
- protection mechanisms
- malicious users
- security management
- identity theft
- stream cipher
- security flaws
- access control
- statistical databases
- security risks
- intrusion detection
- malicious attacks
- insider attacks
- symbolic representation
- key management
- biometric template
- smart card
- computer networks
- network security
- resource constrained
- cryptographic algorithms
- key agreement protocol
- cyber security