Login / Signup
Protection of Keys against Modification Attack.
Wai W. Fung
Mordecai J. Golin
James W. Gray III
Published in:
IEEE Symposium on Security and Privacy (2001)
Keyphrases
</>
secret key
security level
countermeasures
information security
ciphertext
key agreement
smart card
malicious users
privacy protection
public key
hash functions
authentication protocol
relational databases
detection mechanism
diffie hellman
attack detection
data sets