Tagged One-Time Signatures: Tight Security and Optimal Tag Size.
Masayuki AbeBernardo DavidMarkulf KohlweissRyo NishimakiMiyako OhkuboPublished in: IACR Cryptol. ePrint Arch. (2015)
Keyphrases
- worst case
- upper bound
- lower bound
- intrusion detection
- access control
- constant factor
- computer security
- computational complexity
- dynamic programming
- rfid systems
- security properties
- security policies
- security systems
- rfid tags
- tagged images
- optimal solution
- security issues
- statistical databases
- network security
- information security
- intrusion detection system
- low cost