What people are saying - Write a review
We haven't found any reviews in the usual places.
Introduction and Motivation l
Statistical Database Security
3 other sections not shown
Other editions - View all
1-queries algorithm assume assumption authorization system chosen plaintext attack cipher ciphertext Clearly command compute confidential Consequently consider corresponding cryptosystems cycle graph data elements data object data security database element decryption defined determine digital signatures DK(y encoded encryption key encryption methods equations error Euclid's algorithm example exist fact finite formula Furthermore given global grammar GRANT Hamming distance implementation integer knapsack problem known least linear matched matrix median modulo operating system overlap password permitted query plaintext possible precisely privacy homomorphism privileges proof propagation number pseudorandom public key queries of type query graph regular language response restricted result REVOKE Rivest-Shamir-Adleman safety problem satisfied scheme selective compromise sequence solve statistical databases subset substitution boxes substitution-permutation network Suppose symmetric encryption SYSAUTH theft Theorem tracker tuple Turing machine type average UPDATE vector zero