Login / Signup
What Security Can We Achieve Within 4 Rounds?
Carmit Hazay
Muthuramakrishnan Venkitasubramaniam
Published in:
J. Cryptol. (2019)
Keyphrases
</>
intrusion detection
information retrieval
information security
security systems
real time
data sets
neural network
access control
security policies
functional requirements
security threats
security management
information assurance