On the Full MAC Security of a Double-Piped Mode of Operation.
Kan YasudaPublished in: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2011)
Keyphrases
- information security
- network security
- security requirements
- intrusion detection
- security policies
- access control
- security systems
- security issues
- key management
- information assurance
- sensitive data
- security analysis
- security problems
- smart card
- statistical databases
- privacy preserving
- neural network
- security level
- security management
- security measures
- security vulnerabilities