On Statistical Security in Two-Party Computation.
Dakshita KhuranaMuhammad Haris MugheesPublished in: IACR Cryptol. ePrint Arch. (2020)
Keyphrases
- information security
- security issues
- information assurance
- access control
- security model
- intrusion detection
- statistical methods
- key agreement protocol
- statistical analysis
- statistical models
- security requirements
- data security
- functional requirements
- encryption scheme
- computer security
- data mining
- statistical information
- key exchange
- statistical databases
- data driven