Security Proof of JAMBU under Nonce Respecting and Nonce Misuse Cases.
Geng WangHaiyang ZhangFengmei LiuPublished in: IACR Cryptol. ePrint Arch. (2017)
Keyphrases
- security policies
- intrusion detection
- personal data
- access control
- network security
- intrusion detection system
- data mining
- anomaly detection
- security model
- security problems
- information security
- security requirements
- security vulnerabilities
- real time
- security properties
- security systems
- data security
- computer security
- functional requirements
- security issues
- test cases
- social networks