Login / Signup
Adaptive Security of Constrained PRFs.
Georg Fuchsbauer
Momchil Konstantinov
Krzysztof Pietrzak
Vanishree Rao
Published in:
ASIACRYPT (2) (2014)
Keyphrases
</>
access control
information security
intrusion detection
network security
security policies
security requirements
data security
security systems
computer security
security vulnerabilities
information assurance
neural network
end users
statistical databases
data integrity
security measures