Kurosawa-Desmedt Meets Tight Security.
Romain GayDennis HofheinzLisa KohlPublished in: IACR Cryptol. ePrint Arch. (2017)
Keyphrases
- information security
- upper bound
- lower bound
- access control
- security issues
- worst case
- network security
- information assurance
- security policies
- intrusion detection
- statistical databases
- security requirements
- functional requirements
- security problems
- mobile devices
- computer systems
- neural network
- cyber security
- security threats
- real time