Login / Signup
Composable Security in the Tamper-Proof Hardware Model Under Minimal Complexity.
Carmit Hazay
Antigoni Polychroniadou
Muthuramakrishnan Venkitasubramaniam
Published in:
TCC (B1) (2016)
Keyphrases
</>
real time
computational model
high level
statistical model
formal model
prior knowledge
probabilistic model
experimental data
image sequences
bayesian networks
objective function
security requirements
security model