Keyphrases
- international workshop
- acm sigkdd
- protection schemes
- conference on artificial intelligence
- security mechanisms
- security threats
- lecture notes
- computer security
- naacl hlt
- security problems
- international conference
- security breaches
- security protocols
- selected papers
- buffer overflow
- java card
- advances in artificial intelligence
- international symposium
- access control
- security issues
- security vulnerabilities
- stream cipher
- network security
- security flaws
- cyber security and information intelligence
- cyber attacks
- security risks
- denial of service attacks
- low cost
- information security
- cryptographic protocols
- countermeasures
- workshop on artificial intelligence
- advanced encryption standard
- security measures
- lecture notes in artificial intelligence
- security requirements
- fault injection
- chosen plaintext
- trusted computing
- intrusion detection
- computer music
- knowledge discovery and data mining
- computer science
- protection scheme
- operating system
- computer systems
- security policies
- rfid tags
- acm sigmod
- academic researchers
- invited talk
- human computation
- data security