On the security of REDOG.
Tanja LangeAlex PellegriniAlberto RavagnaniPublished in: IACR Cryptol. ePrint Arch. (2023)
Keyphrases
- security requirements
- information security
- security issues
- information assurance
- intrusion detection
- security threats
- security problems
- access control
- functional requirements
- computer security
- security mechanisms
- risk analysis
- security analysis
- security protocols
- security model
- security systems
- cyber attacks
- security level
- operating system
- security management
- data sets