Obfuscation ==> (IND-CPA Security =/=> Circular Security).
Antonio MarcedoneClaudio OrlandiPublished in: IACR Cryptol. ePrint Arch. (2013)
Keyphrases
- access control
- information security
- security issues
- computer security
- information assurance
- security problems
- security policies
- statistical databases
- security requirements
- security level
- data sets
- network security
- functional requirements
- malware detection
- security systems
- virtual private network
- security mechanisms
- hough transform
- intrusion detection
- database systems