New Definitions and Separations for Circular Security.
David CashMatthew GreenSusan HohenbergerPublished in: Public Key Cryptography (2012)
Keyphrases
- information security
- network security
- security issues
- computer security
- access control
- security problems
- security systems
- genetic algorithm
- intrusion detection
- statistical databases
- security requirements
- functional requirements
- harmonic functions
- real time
- security properties
- cyber attacks
- security analysis
- security mechanisms
- databases