<--- Back to Details
First PageDocument Content
Computer network security / Multilevel security / Mandatory access control / Ring / Trusted system / Operating system / Capability-based security / Kernel / Security policy / Computer security / Security / Access control
Date: 2004-09-02 16:22:23
Computer network security
Multilevel security
Mandatory access control
Ring
Trusted system
Operating system
Capability-based security
Kernel
Security policy
Computer security
Security
Access control

Add to Reading List

Source URL: cs.unomaha.edu

Download Document from Source Website

File Size: 962,33 KB

Share Document on Facebook

Similar Documents

Algebra / Abstract algebra / Mathematics / Commutative algebra / Lattice-based cryptography / Post-quantum cryptography / Cryptography / Field theory / Ring learning with errors / Ring learning with errors key exchange / Ring learning with errors signature

On the Ring-LWE and Polynomial-LWE Problems Miruna Rosca1,2 , Damien Stehlé1 , and Alexandre Wallet1 1 ENS de Lyon, Laboratoire LIP (U. Lyon, CNRS, ENSL, INRIA, UCBL), France

DocID: 1xVxG - View Document

Wheel + Ring = Reel: the Impact of Route Filtering on the Stability of Policy Routing Luca Cittadini Giuseppe Di Battista

DocID: 1xVsm - View Document

Cryptography / Post-quantum cryptography / Lattice-based cryptography / Computational hardness assumptions / Lie groups / Ring learning with errors / Learning with errors / Lattice / Homomorphic encryption / Order / Entropy / Ring learning with errors key exchange

Order-LWE and the Hardness of Ring-LWE with Entropic Secrets Zvika Brakerski Renen Perlman Weizmann Institute of Science∗ Abstract

DocID: 1xUGh - View Document

Cryptography / Post-quantum cryptography / Lattice-based cryptography / Ring learning with errors / Learning with errors / Obfuscation / Lattice

Obfuscating Conjunctions under Entropic Ring LWE∗ Zvika Brakerski† Weizmann Vinod Vaikuntanathan‡ MIT

DocID: 1xUpK - View Document

Cryptography / Public-key cryptography / Digital signature / IP / Soundness / Group signature / Post-quantum cryptography / Designated verifier signature / Computational complexity theory

Short  Accountable  Ring   Signatures Based  on  DDH Jonathan  Bootle,  Andrea  Cerulli,  Pyrros Chaidos,  Essam Ghadafi,   Jens  Groth,  and  Christophe  Petit  

DocID: 1xU3N - View Document