Bunshin: Compositing Security Mechanisms through Diversification (with Appendix).
Meng XuKangjie LuTaesoo KimWenke LeePublished in: CoRR (2017)
Keyphrases
- security mechanisms
- resource constrained
- access control
- security issues
- security systems
- smart card
- security problems
- operating system
- security requirements
- tabu search
- digital signature
- security protocols
- cryptographic algorithms
- sensor networks
- security services
- payment systems
- genetic algorithm
- data mining
- resource constraints
- information security
- distributed systems
- information systems
- security measures
- real time