Separations in circular security for arbitrary length key cycles, revisited.
Jinyong ChangHonglong DaiMaozhi XuRui XuePublished in: Secur. Commun. Networks (2016)
Keyphrases
- arbitrary length
- high security
- security issues
- access control
- computer security
- security requirements
- network security
- hough transform
- intrusion detection
- information security
- neural network
- security analysis
- secure communication
- intrusion detection system
- nearest neighbor
- security systems
- private key
- image encryption
- association rules
- data mining