Verified Correctness and Security of mbedTLS HMAC-DRBG.
Katherine Q. YeMatthew GreenNaphat SanguansinLennart BeringerAdam PetcherAndrew W. AppelPublished in: CoRR (2017)
Keyphrases
- information security
- security problems
- security threats
- access control
- intrusion detection
- security requirements
- statistical databases
- low cost
- information assurance
- security mechanisms
- network security
- database systems
- security issues
- anomaly detection
- security systems
- malware detection
- website
- data encryption
- information systems