On the Security of NMAC and Its Variants.
Fanbao LiuChangxiang ShenTao XieDengguo FengPublished in: IACR Cryptol. ePrint Arch. (2011)
Keyphrases
- information security
- access control
- intrusion detection
- security requirements
- information assurance
- computer security
- security issues
- security mechanisms
- security measures
- security problems
- security policies
- network security
- security systems
- data sets
- security analysis
- security model
- database
- key management
- security level
- security properties
- neural network
- high security
- real time