From Passive to Covert Security at Low Cost.
Ivan DamgårdMartin GeislerJesper Buus NielsenPublished in: IACR Cryptol. ePrint Arch. (2009)
Keyphrases
- low cost
- information flow
- security issues
- intrusion detection
- rfid tags
- access control
- information security
- statistical databases
- real time
- computer security
- digital camera
- network security
- low power
- data acquisition
- security policies
- security requirements
- security threats
- cyber security
- security level
- database systems
- terrorist networks
- security management
- functional requirements
- security mechanisms
- security problems
- information assurance
- cyber attacks
- data integrity
- social networks
- data mining
- neural network