On the Security of the "Free-XOR" Technique.
Seung Geol ChoiJonathan KatzRanjit KumaresanHong-Sheng ZhouPublished in: TCC (2012)
Keyphrases
- information security
- intrusion detection
- security policies
- security requirements
- network security
- information assurance
- security management
- security threats
- security issues
- access control
- statistical databases
- low cost
- key management
- computer security
- security analysis
- security level
- cryptographic protocols
- security properties
- information systems
- neural network
- data encryption
- databases