Multi-trapdoor hash functions and their applications in network security.
Santosh ChandrasekharMukesh SinghalPublished in: CNS (2014)
Keyphrases
- network security
- hash functions
- computer networks
- intrusion detection
- traffic analysis
- intrusion detection system
- dos attacks
- security protection
- similarity search
- security policies
- network traffic
- risk assessment
- information security
- locality sensitive
- anomaly detection
- order preserving
- network administrators
- database
- locality sensitive hashing
- secret key
- information systems
- security breaches
- anti phishing
- packet filtering
- approximate similarity search
- hamming distance
- situation assessment
- block cipher
- binary codes
- feature space
- neural network