Hiding Cliques for Cryptographic Security.
Ari JuelsMarcus PeinadoPublished in: Des. Codes Cryptogr. (2000)
Keyphrases
- key management
- security protocols
- security properties
- encryption scheme
- security requirements
- encryption decryption
- information security
- security issues
- random number generator
- cryptographic protocols
- smart card
- encryption key
- fuzzy vault
- high assurance
- stream cipher
- public key cryptography
- elliptic curve cryptography
- intrusion detection
- cryptographic algorithms
- security policies
- secure communication
- access control
- network security
- security systems
- authentication protocol
- resource constrained
- secret key
- statistical databases
- security level
- maximal cliques
- security services
- security model
- security analysis
- security mechanisms
- graph structure
- information systems