Security from Disjoint Paths: Is It Possible? (Transcript of Discussion).
Marios O. ChoudaryPublished in: Security Protocols Workshop (2017)
Keyphrases
- disjoint paths
- approximation algorithms
- information security
- security issues
- access control
- security problems
- network security
- directed graph
- computer security
- undirected graph
- security threats
- security policies
- rfid tags
- security systems
- security level
- intrusion detection
- security analysis
- security protocols
- special case