Login / Signup
How Well Can I Secure My System?
Barbara Kordy
Wojciech Widel
Published in:
IFM (2017)
Keyphrases
</>
data sets
covert channel
lightweight
security issues
cryptographic protocols
secret sharing
integrity verification
real time
scalar product
security management
authentication scheme
security protocols
security requirements
highly efficient
similarity measure
machine learning
data mining
neural network