Login / Signup
Witnessing Secure Compilation.
Kedar S. Namjoshi
Lucas M. Tabajara
Published in:
CoRR (2019)
Keyphrases
</>
security issues
key management
cryptographic protocols
security analysis
covert channel
security management
identity management
authentication scheme
code generation
data sets
highly efficient
case study
authentication protocol
sensitive data
security requirements
genetic algorithm
secure communication
databases