Unifying Freedom and Separation for Tight Probing-Secure Composition.
Sonia BelaïdGaëtan CassiersMatthieu RivainAbdul Rahman TalebPublished in: CRYPTO (3) (2023)
Keyphrases
- peer to peer
- lower bound
- upper bound
- worst case
- security issues
- ad hoc networks
- security management
- web service composition
- security requirements
- security analysis
- highly efficient
- key exchange
- web services composition
- cryptographic protocols
- authentication protocol
- database
- information sharing
- web services
- search engine