Login / Signup
Towards Closing the Security Gap of Tweak-aNd-Tweak (TNT).
Chun Guo
Jian Guo
Eik List
Ling Song
Published in:
ASIACRYPT (1) (2020)
Keyphrases
</>
access control
intrusion detection
security issues
information security
security requirements
end users
network security
security policies
security problems
security measures
information assurance
data sets
neural network
low cost
morphological operators
security protocols