Universally Composable Security with Local Adversaries.
Ran CanettiMargarita ValdPublished in: SCN (2012)
Keyphrases
- information assurance
- information security
- security issues
- intrusion detection
- security requirements
- security management
- computer security
- data sets
- security threats
- security systems
- access control
- security model
- statistical databases
- data mining
- security mechanisms
- key management
- high security
- security analysis
- social networks
- functional requirements
- real time
- information systems
- web services
- mobile agents