Leakage squeezing: Optimal implementation and security evaluation.
Claude CarletJean-Luc DangerSylvain GuilleyHoussem MaghrebiPublished in: J. Math. Cryptol. (2014)
Keyphrases
- security threats
- security issues
- security requirements
- neural network
- information security
- database
- dynamic programming
- worst case
- efficient implementation
- security systems
- evaluation method
- information assurance
- information leakage
- security properties
- security model
- evaluation model
- statistical databases
- network security
- database systems
- data mining
- data sets