Security Proof with Dishonest Keys.
Hubert Comon-LundhVéronique CortierGuillaume ScerriPublished in: POST (2012)
Keyphrases
- intrusion detection
- private key
- information security
- key agreement
- security issues
- security mechanisms
- public key
- statistical databases
- security policies
- computer security
- network security
- security management
- access control
- security requirements
- neural network
- hash functions
- key management
- data security
- security properties
- security problems
- image encryption