Sign in

Technical Analysis of Countermeasures against Attack on XML Encryption - or - Just Another Motivation for Authenticated Encryption.

Juraj SomorovskyJörg Schwenk
Published in: SERVICES (2012)
Keyphrases
  • countermeasures
  • information security
  • secret key
  • rural areas
  • key exchange
  • power analysis
  • xml documents
  • wireless sensor networks
  • key exchange protocol
  • data mining
  • data analysis
  • xml data
  • security measures