Counterexamples to New Circular Security Assumptions Underlying iO.
Samuel B. HopkinsAayush JainHuijia LinPublished in: CRYPTO (2) (2021)
Keyphrases
- information security
- access control
- intrusion detection
- security policies
- security systems
- network security
- security issues
- security management
- security level
- security mechanisms
- computer security
- data security
- high security
- polar coordinates
- security model
- sensitive data
- statistical databases
- smart card
- hough transform