Login / Signup
Key dependent message security: recent results and applications.
Tal Malkin
Isamu Teranishi
Moti Yung
Published in:
CODASPY (2011)
Keyphrases
</>
high security
email
security level
information security
security requirements
access control
intrusion detection
security problems
messages exchanged
data sets
encryption algorithms
secure communication
private key
cyber security
statistical databases
security policies
sensor networks
database systems