Universal Security - From Bits and Mips to Pools, Lakes - and Beyond.
Arjen K. LenstraThorsten KleinjungEmmanuel ThoméPublished in: Number Theory and Cryptography (2013)
Keyphrases
- information security
- intrusion detection
- information assurance
- statistical databases
- computer security
- network security
- security issues
- security requirements
- security policies
- security management
- security threats
- network management
- key management
- security mechanisms
- data sets
- hamming distance
- database systems
- neural network