Login / Signup
Optimal Security Proofs for Full Domain Hash, Revisited.
Saqib A. Kakvi
Eike Kiltz
Published in:
J. Cryptol. (2018)
Keyphrases
</>
information security
information assurance
domain specific
intrusion detection
domain independent
optimal solution
access control
domain experts
database
security systems
security issues
network security
security management
security requirements
optimal design
security policies
cross domain
data sets