Algebraic Decomposition for Probing Security.
Claude CarletEmmanuel ProuffMatthieu RivainThomas RochePublished in: IACR Cryptol. ePrint Arch. (2016)
Keyphrases
- information security
- intrusion detection
- security requirements
- computer security
- security issues
- decomposition method
- security management
- data sets
- security threats
- security properties
- decomposition methods
- cyber security
- security analysis
- key management
- sensitive data
- wavelet packet
- network management
- security policies
- access control
- database systems
- neural network