Performance and Security Improvements for Tor: A Survey.
Mashael AlSabahIan GoldbergPublished in: ACM Comput. Surv. (2016)
Keyphrases
- security requirements
- information security
- network security
- security issues
- security policies
- information assurance
- security problems
- intrusion detection
- access control
- database
- data security
- data encryption
- security vulnerabilities
- high security
- security threats
- security protocols
- security properties
- cryptographic protocols
- security systems
- cyber security
- computer security
- key agreement protocol
- functional requirements
- neural network
- databases