Login / Signup
Security/Efficiency Tradeoffs for Permutation-Based Hashing.
Phillip Rogaway
John P. Steinberger
Published in:
EUROCRYPT (2008)
Keyphrases
</>
security issues
intrusion detection
security requirements
security policies
data structure
security level
network management
access control
data sets
network security
information security
sensor networks
computational complexity
functional requirements
security mechanisms
security protocols
security problems