Achieving CCA security from DCCA security more efficiently by using the KEM+DEM hybrid paradigm.
Yuan ChenQingkuan DongPublished in: Secur. Commun. Networks (2015)
Keyphrases
- intrusion detection
- access control
- information security
- statistical databases
- security issues
- security requirements
- computer security
- security threats
- network security
- key management
- security policies
- security systems
- information assurance
- security level
- security problems
- security management
- data sets
- security model
- security mechanisms
- feature extraction
- face recognition
- web services
- neural network