Weakening Security Assumptions and Oblivious Transfer (Abstract).
Claude CrépeauJoe KilianPublished in: CRYPTO (1988)
Keyphrases
- security requirements
- access control
- network security
- security issues
- information assurance
- higher level
- intrusion detection
- information security
- security policies
- security problems
- security systems
- computer security
- high level
- security management
- statistical databases
- security mechanisms
- key management
- simplifying assumptions
- data mining
- encryption scheme
- functional requirements
- security threats
- personal information
- security measures