Practical Perfect Cryptographic Security.
Ueli M. MaurerPublished in: Advances In Computational Complexity Theory (1990)
Keyphrases
- security properties
- security protocols
- key management
- security requirements
- smart card
- encryption scheme
- fuzzy vault
- access control
- encryption decryption
- information security
- cryptographic protocols
- real world
- security issues
- security threats
- data encryption
- encryption key
- security analysis
- cryptographic algorithms
- high assurance
- network security
- computer security
- data security
- elliptic curve cryptography