Secure provenance using an authenticated data structure approach.
Fuzel JamilAbid KhanAdeel AnjumMansoor AhmedFarhana JabeenNadeem JavaidPublished in: Comput. Secur. (2018)
Keyphrases
- data structure
- key exchange protocol
- key exchange
- authentication scheme
- key agreement protocol
- key distribution
- password based authenticated key exchange
- diffie hellman
- space efficient
- user authentication
- metadata
- suffix tree
- efficient data structures
- tree structure
- smart card
- fine grained
- group communication
- security analysis
- provenance information
- data quality
- secure communication
- key management
- index structure
- fault tolerant
- standard model
- provably secure
- multidimensional data
- quadtree