Login / Signup
Dual Form Signatures: An Approach for Proving Security from Static Assumptions.
Michael Gerbush
Allison B. Lewko
Adam O'Neill
Brent Waters
Published in:
ASIACRYPT (2012)
Keyphrases
</>
security problems
real time
network security
network management
computer security
database
data mining
anomaly detection
intrusion detection
network traffic
information security
security requirements
functional requirements
security mechanisms
dynamic analysis