Foundations, Properties, and Security Applications of Puzzles: A Survey.
Isra Mohamed AliMaurantonio CaproluRoberto Di PietroPublished in: ACM Comput. Surv. (2020)
Keyphrases
- artificial intelligence
- information security
- access control
- constraint satisfaction
- network security
- security requirements
- security problems
- security properties
- security policies
- security mechanisms
- key management
- desirable properties
- security threats
- security model
- data security
- security protocols
- topological properties
- database
- mobile devices
- website
- information systems
- genetic algorithm
- databases