Circular Security Separations for Arbitrary Length Cycles from LWE.
Venkata KoppulaBrent WatersPublished in: CRYPTO (2) (2016)
Keyphrases
- arbitrary length
- intrusion detection
- information security
- statistical databases
- access control
- hough transform
- information assurance
- security policies
- security issues
- network security
- security systems
- security requirements
- bit strings
- security problems
- security mechanisms
- neural network
- data mining
- sensitive data
- cyber security
- elliptic curve
- b tree
- security threats
- security management
- security measures
- tree structure
- database management systems