Two-Round Man-in-the-Middle Security from LPN.
David CashEike KiltzStefano TessaroPublished in: IACR Cryptol. ePrint Arch. (2015)
Keyphrases
- information security
- network security
- security issues
- security policies
- intrusion detection
- statistical databases
- security systems
- information assurance
- security problems
- neural network
- security analysis
- security protocols
- security mechanisms
- high security
- security management
- role based access control
- cyber security
- computer security
- functional requirements
- access control
- case study
- information systems