Covert Security with Public Verifiability: Faster, Leaner, and Simpler.
Cheng HongJonathan KatzVladimir KolesnikovWen-jie LuXiao WangPublished in: IACR Cryptol. ePrint Arch. (2018)
Keyphrases
- security properties
- information flow
- security issues
- information security
- security policies
- security requirements
- access control
- security model
- memory efficient
- information assurance
- security systems
- cyber security
- intrusion detection
- encryption scheme
- security mechanisms
- computer security
- security analysis
- functional requirements
- statistical databases
- authentication protocol
- network security
- operating system
- security threats
- security management
- security measures
- neural network