Circular Security Is Complete for KDM Security.
Fuyuki KitagawaTakahiro MatsudaPublished in: IACR Cryptol. ePrint Arch. (2020)
Keyphrases
- information security
- information assurance
- security issues
- security level
- access control
- security mechanisms
- security management
- security problems
- security analysis
- statistical databases
- intrusion detection
- network security
- security requirements
- functional requirements
- risk analysis
- security measures
- databases
- network management
- neural network
- security threats
- cyber attacks
- security systems
- security policies
- computer security
- key management
- data sets