On Statistical Security in Two-Party Computation.
Dakshita KhuranaMuhammad Haris MugheesPublished in: TCC (2) (2020)
Keyphrases
- information security
- access control
- security systems
- computer security
- security issues
- key agreement protocol
- security requirements
- network security
- intrusion detection
- security policies
- information theoretic
- functional requirements
- security analysis
- security model
- security level
- biometric systems
- hypothesis testing
- security mechanisms
- computer systems
- security threats
- data sets