Clone Detection in Secure Messaging: Improving Post-Compromise Security in Practice.
Cas CremersJaiden FairozeBenjamin KieslAurora NaskaPublished in: CCS (2020)
Keyphrases
- clone detection
- security issues
- security requirements
- security level
- security measures
- key management
- security mechanisms
- security protocols
- security properties
- information security
- sensitive data
- security analysis
- data encryption
- cryptographic protocols
- linux kernel
- diffie hellman
- encryption scheme
- authentication protocol
- security policies
- key agreement protocol
- string matching
- user authentication
- access control
- key distribution
- software reuse
- software architecture
- smart card
- software systems
- relational databases
- rfid tags