A Discussion of Election Security, Cryptography, and Exceptional Access With Michael Alan Specter.
Bob BlakleyLorrie Faith CranorPublished in: IEEE Secur. Priv. (2021)
Keyphrases
- information security
- access control
- john mccarthy
- encryption algorithms
- intrusion detection
- access requests
- cellular automata
- security policies
- security requirements
- security issues
- sys tems
- public key cryptography
- security model
- security level
- network security
- security mechanisms
- information systems
- security systems
- situational awareness
- cryptographic protocols
- public key
- elliptic curve cryptography
- cryptographic algorithms
- high security
- anomaly detection
- statistical databases
- windows xp
- access control mechanism
- image encryption
- role based access control
- learning curve