Lifting the Security of NI-MAC Beyond Birthday Bound.
Avijit DuttaGoutam PaulPublished in: IACR Cryptol. ePrint Arch. (2015)
Keyphrases
- intrusion detection
- wavelet transform
- information assurance
- computer security
- upper bound
- access control
- security issues
- security requirements
- key management
- statistical databases
- security policies
- information security
- error bounds
- data security
- lower bound
- cyber security
- worst case
- security analysis
- security level
- network security
- security mechanisms
- sensitive data
- user authentication
- information systems
- security problems
- security measures
- windows xp
- multiscale