Circular Security Is Complete for KDM Security.
Fuyuki KitagawaTakahiro MatsudaPublished in: ASIACRYPT (1) (2020)
Keyphrases
- intrusion detection
- information security
- security policies
- security mechanisms
- security issues
- security problems
- computer security
- information assurance
- security model
- statistical databases
- network security
- functional requirements
- risk analysis
- cyber security
- case study
- security management
- security measures
- high security
- website