Bounded Key-Dependent Message Security.
Boaz BarakIftach HaitnerDennis HofheinzYuval IshaiPublished in: EUROCRYPT (2010)
Keyphrases
- high security
- information security
- network security
- private key
- neural network
- access control
- intrusion detection
- security requirements
- security measures
- security vulnerabilities
- database
- secure communication
- security problems
- security properties
- data security
- security analysis
- computer security
- information systems