The Exact Security of PMAC.
Peter GaziKrzysztof PietrzakMichal RybárPublished in: IACR Trans. Symmetric Cryptol. (2016)
Keyphrases
- information security
- security requirements
- network security
- information assurance
- computer security
- security policies
- security problems
- security level
- data security
- access control
- malware detection
- security systems
- real time
- security issues
- statistical databases
- intrusion detection
- security mechanisms
- information systems
- security model
- network management
- wireless sensor networks
- security threats
- security management
- security vulnerabilities
- database