Graph Similarity and Its Applications to Hardware Security.
Marc FyrbiakSebastian WallatSascha ReinhardNicolai BissantzChristof PaarPublished in: IACR Cryptol. ePrint Arch. (2019)
Keyphrases
- real time
- similarity graph
- hardware and software
- similarity scores
- random number generator
- security issues
- similarity function
- information security
- low cost
- graph theory
- random walk
- computer systems
- graph representation
- graph structure
- similarity measure
- inexact graph matching
- similarity metric
- graph model
- bipartite graph
- connected components
- network security
- graph matching
- directed graph
- similarity measurement
- maximum common subgraph
- access control
- distance function
- computer security
- normalized cut
- weighted graph
- graph partitioning
- statistical databases
- hardware implementation
- graph theoretic
- security mechanisms
- graph databases
- computing systems
- security protocols
- hardware architecture
- security policies
- intrusion detection
- protection scheme
- graph mining