Login / Signup
Security and Composability of Randomness Expansion from Bell Inequalities
Serge Fehr
Ran Gelles
Christian Schaffner
Published in:
CoRR (2011)
Keyphrases
</>
information security
intrusion detection
access control
security issues
network security
security requirements
linear inequalities
security policies
information assurance
security management
sufficient conditions
security mechanisms
key management
computer security
valid inequalities
security systems
security threats
security vulnerabilities
network management
cyber security
mixed integer programming