Login / Signup
Separations in Circular Security for Arbitrary Length Key Cycles.
Venkata Koppula
Kim Ramchen
Brent Waters
Published in:
TCC (2) (2015)
Keyphrases
</>
arbitrary length
high security
information security
access control
security issues
security problems
key management
security systems
databases
security requirements
network security
hough transform
intrusion detection
neural network
security protocols
security level
block cipher
secure communication