Calling Out Cheaters: Covert Security with Public Verifiability.
Gilad AsharovClaudio OrlandiPublished in: ASIACRYPT (2012)
Keyphrases
- security properties
- information flow
- information security
- statistical databases
- security requirements
- intrusion detection
- security vulnerabilities
- information assurance
- access control
- security policies
- security analysis
- policy makers
- information systems
- security problems
- data security
- security issues
- neural network
- public services
- public space
- key management