Login / Signup
Secure Audit Logs with Verifiable Excerpts.
Gunnar Hartung
Published in:
CT-RSA (2016)
Keyphrases
</>
secret sharing
intrusion detection
security issues
sufficient conditions
log data
lightweight
multi party
log files
security requirements
security analysis
anomaly detection
security mechanisms
key management
quality assurance
security protocols
secret sharing scheme
case study