Burmester-Desmedt Tree-Based Key Transport Revisited: Provable Security.
Jens-Matthias BohliMaría Isabel González VascoRainer SteinwandtPublished in: IACR Cryptol. ePrint Arch. (2005)
Keyphrases
- high security
- information security
- intrusion detection
- security analysis
- information assurance
- private key
- security level
- security systems
- security protocols
- security issues
- statistical databases
- security mechanisms
- neural network
- security requirements
- data security
- access control
- security management
- secure communication
- data structure
- data mining