On the security margin of MAC striping.
Thomas EisenbarthAaron MeyerowitzRainer SteinwandtPublished in: Inf. Process. Lett. (2015)
Keyphrases
- access control
- security issues
- information security
- network security
- intrusion detection
- security requirements
- security threats
- computer security
- security policies
- statistical databases
- security problems
- security level
- security model
- security systems
- security mechanisms
- information assurance
- cyber security
- key management
- support vector
- distributed systems