Security and Composability of Randomness Expansion from Bell Inequalities
Serge FehrRan GellesChristian SchaffnerPublished in: CoRR (2011)
Keyphrases
- information security
- intrusion detection
- access control
- security issues
- network security
- security requirements
- linear inequalities
- security policies
- information assurance
- security management
- sufficient conditions
- security mechanisms
- key management
- computer security
- valid inequalities
- security systems
- security threats
- security vulnerabilities
- network management
- cyber security
- mixed integer programming