Practical Verifiable Random Function with RKA Security.
Tsz Hon YuenShimin PanSheng HuangXiaoting ZhangPublished in: ACISP (2023)
Keyphrases
- intrusion detection
- computer security
- security issues
- access control
- security protocols
- real world
- security requirements
- network security
- information security
- neural network
- distributed systems
- sufficient conditions
- computer networks
- low cost
- security policies
- piecewise linear
- objective function
- information systems
- uniformly distributed
- genetic algorithm
- security analysis
- databases
- data security
- security properties
- security threats
- security measures