Login / Signup
How to Efficiently Evaluate RAM Programs with Malicious Security.
Arash Afshar
Zhangxiang Hu
Payman Mohassel
Mike Rosulek
Published in:
EUROCRYPT (1) (2015)
Keyphrases
</>
intrusion detection
information security
network security
security requirements
malicious attacks
access control
security issues
computer security
security level
security problems
security architecture
security measures
malicious users
malicious activities