Login / Signup

Security definitions, entropy measures and constructions for implicitly detecting data corruption.

Michael E. KounavisDavid DurhamSergej DeutschKen Grewal
Published in: Comput. Commun. (2020)
Keyphrases
  • data corruption
  • buffer overflow
  • access control
  • security policies
  • intrusion detection
  • information theoretic
  • information systems
  • mutual information