Unconditional Security Against Memory-Bounded Adversaries.
Christian CachinUeli M. MaurerPublished in: CRYPTO (1997)
Keyphrases
- intrusion detection
- access control
- statistical databases
- information assurance
- information security
- bounded memory
- security analysis
- memory usage
- memory requirements
- memory space
- network management
- computer security
- key management
- encryption scheme
- security level
- security management
- windows xp
- computing power
- security requirements
- network security
- main memory
- real time
- human operators
- limited memory
- security protocols
- user authentication
- security issues
- security problems
- security threats
- memory size
- data structure
- decision making