Everlasting security in the bounded storage model | IEEE Journals & Magazine | IEEE Xplore