Optimally Tight Security Proofs for Hash-Then-Publish Time-Stamping.
Ahto BuldasMargus NiitsooPublished in: ACISP (2010)
Keyphrases
- information security
- high quality
- lower bound
- intrusion detection
- security issues
- security requirements
- theorem prover
- upper bound
- data security
- access control
- hash functions
- security vulnerabilities
- security measures
- network security
- linked data
- formal proofs
- information assurance
- security management
- security problems
- functional requirements
- security policies
- b tree
- anomaly detection
- biometric systems
- computer security
- worst case
- elliptic curve
- security properties
- rfid tags
- high dimensional
- data structure
- information systems
- theorem proving