On the security of DLCSP over $GL_n(\mathbb {F}_q[S_r])$.
Atul PandeyIndivar GuptaDhiraj Kumar SinghPublished in: Appl. Algebra Eng. Commun. Comput. (2023)
Keyphrases
- information security
- security policies
- access control
- security requirements
- network security
- statistical databases
- security issues
- security problems
- intrusion detection
- data security
- key management
- network management
- information assurance
- security threats
- data integrity
- encryption scheme
- functional requirements
- real time
- first order logic
- special case
- information systems
- data mining