On the Security of the Free-XOR Technique.
Seung Geol ChoiJonathan KatzRanjit KumaresanHong-Sheng ZhouPublished in: IACR Cryptol. ePrint Arch. (2011)
Keyphrases
- information security
- security issues
- intrusion detection
- computer security
- access control
- security requirements
- security systems
- information assurance
- security threats
- security mechanisms
- sensitive data
- statistical databases
- security protocols
- security level
- database systems
- case study
- security policies
- network security
- security vulnerabilities