On the Equivalence of Several Security Notions of KEM and DEM.
Waka NagaoYoshifumi ManabeTatsuaki OkamotoPublished in: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2008)
Keyphrases
- security issues
- information security
- statistical databases
- intrusion detection
- security requirements
- security problems
- access control
- security analysis
- security policies
- security systems
- security level
- information assurance
- network security
- security model
- smart card
- digital elevation models
- security mechanisms
- computer security
- security protocols
- data security
- security threats
- security vulnerabilities
- digital elevation