Login / Signup
On deterministic IC with common and private message under security constraints.
Hendrik Vogt
Zohaib Hassan Awan
Aydin Sezgin
Published in:
GlobalSIP (2016)
Keyphrases
</>
intrusion detection
information security
email
integrated circuit
security requirements
linear constraints
security problems
access control
privacy preserving
security issues
finite state automaton
lower bound
geometric constraints
security policies
resource constraints