Security Preserving Amplification of Hardness
Oded GoldreichRussell ImpagliazzoLeonid A. LevinRamarathnam VenkatesanDavid ZuckermanPublished in: FOCS (1990)
Keyphrases
- access control
- security issues
- security requirements
- security policies
- information security
- intrusion detection
- security management
- security threats
- phase transition
- security problems
- network security
- computer security
- sensitive data
- statistical databases
- security systems
- security properties
- information assurance
- information theoretic
- security analysis
- data mining
- computational complexity
- np hard
- worst case
- computer systems
- cyber attacks
- np complete
- security protocols
- data sets
- cloud computing
- key management
- security mechanisms
- lightweight
- privacy preserving
- rfid tags