Login / Signup
Semi-adaptive Security and Bundling Functionalities Made Generic and Easy.
Rishab Goyal
Venkata Koppula
Brent Waters
Published in:
TCC (B2) (2016)
Keyphrases
</>
computer security
information security
security issues
access control
intrusion detection
security systems
security properties
security policies
anomaly detection
high level
network security
security requirements
encryption scheme
key management
data integrity
cyber attacks
real time