Financially Backed Covert Security.
Sebastian FaustCarmit HazayDavid KretzlerBenjamin SchlosserPublished in: Public Key Cryptography (2) (2022)
Keyphrases
- information flow
- information security
- security policies
- security systems
- security requirements
- security issues
- information assurance
- access control
- network security
- computer security
- security management
- security problems
- intrusion detection
- database
- security mechanisms
- security level
- security measures
- functional requirements
- malware detection
- authentication protocol
- statistical databases
- databases