Login / Signup
Two-Round Man-in-the-Middle Security from LPN.
David Cash
Eike Kiltz
Stefano Tessaro
Published in:
IACR Cryptol. ePrint Arch. (2015)
Keyphrases
</>
information security
network security
security issues
security policies
intrusion detection
statistical databases
security systems
information assurance
security problems
neural network
security analysis
security protocols
security mechanisms
high security
security management
role based access control
cyber security
computer security
functional requirements
access control
case study
information systems