Covert Security with Public Verifiability: Faster, Leaner, and Simpler.
Cheng HongJonathan KatzVladimir KolesnikovWen-jie LuXiao WangPublished in: EUROCRYPT (3) (2019)
Keyphrases
- security properties
- information flow
- information security
- security issues
- security requirements
- access control
- security management
- intrusion detection
- information assurance
- security policies
- security mechanisms
- security analysis
- security problems
- security vulnerabilities
- statistical databases
- key management
- computer security
- security threats
- network analysis
- formal model
- memory efficient
- security systems
- security level
- highly efficient