Post-Collusion Security and Distance Bounding.
Sjouke MauwZach SmithJorge Toro-PozoRolando Trujillo-RasuaPublished in: CCS (2019)
Keyphrases
- information security
- access control
- security issues
- information assurance
- upper bound
- intrusion detection
- security threats
- security level
- distance function
- euclidean distance
- network security
- security mechanisms
- statistical databases
- security problems
- security requirements
- hamming distance
- distance measure
- similarity measure
- functional requirements
- database
- key management
- nearest neighbor
- security vulnerabilities
- data mining