Provable Security Proofs and their Interpretation in the Real World.
Vikram SinghPublished in: IACR Cryptol. ePrint Arch. (2013)
Keyphrases
- real world
- wide range
- information security
- synthetic data
- data sets
- case study
- information assurance
- security issues
- image interpretation
- access control
- high level
- network security
- theorem proving
- security policies
- statistical databases
- real life
- formal proof
- security problems
- security systems
- data mining
- intrusion detection
- security management
- cryptographic protocols
- security analysis
- computer security
- key management
- encryption scheme
- functional requirements
- security requirements