GCM Security Bounds Reconsidered.
Yuichi NiwaKeisuke OhashiKazuhiko MinematsuTetsu IwataPublished in: FSE (2015)
Keyphrases
- information security
- upper bound
- intrusion detection
- lower bound
- access control
- network security
- tight bounds
- security requirements
- worst case
- security level
- security issues
- high security
- security problems
- security model
- computer security
- security mechanisms
- security management
- functional requirements
- security threats
- security vulnerabilities
- information assurance
- security systems
- cyber security
- database
- vc dimension
- security policies
- web services