Universally Composable Security With Local Adversaries.
Ran CanettiMargarita ValdPublished in: IACR Cryptol. ePrint Arch. (2012)
Keyphrases
- information security
- intrusion detection
- security requirements
- security issues
- network security
- information systems
- real time
- access control
- statistical databases
- information assurance
- security level
- computer security
- case study
- website
- genetic algorithm
- functional requirements
- security mechanisms
- neural network
- security protocols
- data security
- databases
- security threats
- security vulnerabilities
- data encryption
- data sets