Login / Signup
Symmetric Nonce Respecting Security Model and the MEM Mode of Operation.
Peng Wang
Dengguo Feng
Wenling Wu
Published in:
INDOCRYPT (2006)
Keyphrases
</>
security model
access control
public key
security requirements
security analysis
security architecture
provably secure
public key cryptography
designated verifier
databases
fine grained
smart card
data points
cost effective
information security
encryption scheme