Analyzing the Provable Security Bounds of GIFT-COFB and Photon-Beetle.
Akiko InoueTetsu IwataKazuhiko MinematsuPublished in: ACNS (2022)
Keyphrases
- access control
- upper bound
- information security
- lower bound
- network security
- intrusion detection
- statistical databases
- average case
- security systems
- worst case
- security issues
- security requirements
- upper and lower bounds
- functional requirements
- information assurance
- security management
- confidence bounds
- security problems
- security level
- security policies
- security mechanisms
- lower and upper bounds
- security threats
- error bounds
- monte carlo
- data mining