How to Efficiently Evaluate RAM Programs with Malicious Security.
Arash AfsharZhangxiang HuPayman MohasselMike RosulekPublished in: IACR Cryptol. ePrint Arch. (2014)
Keyphrases
- malicious attacks
- database systems
- information security
- security protocols
- insider attacks
- security level
- cyber security
- key management
- computer programs
- statistical databases
- security policies
- intrusion detection
- access control
- security mechanisms
- security analysis
- network security
- security systems
- security problems
- data structure
- malicious users
- information systems