Login / Signup
Simple and tight device-independent security proofs.
Rotem Arnon Friedman
Renato Renner
Thomas Vidick
Published in:
CoRR (2016)
Keyphrases
</>
lower bound
data sets
intrusion detection
database
neural network
genetic algorithm
case study
control system
sensor networks
operating system
security mechanisms
key management
security management