Black-Box Transformations from Passive to Covert Security with Public Verifiability.
Ivan DamgårdClaudio OrlandiMark SimkinPublished in: CRYPTO (2) (2020)
Keyphrases
- black box
- information flow
- security properties
- black boxes
- white box
- information security
- security issues
- access control
- integration testing
- state transition
- network security
- security requirements
- intrusion detection
- test cases
- statistical databases
- case study
- security policies
- hybrid systems
- cryptographic protocols
- computational intelligence
- training data
- machine learning
- white box testing