Login / Signup

Oblivious signature-based envelope.

Ninghui LiWenliang DuDan Boneh
Published in: PODC (2003)
Keyphrases
  • network intrusion detection
  • intrusion detection
  • anomaly detection
  • network traffic
  • intrusion detection system
  • information retrieval
  • case study
  • pairwise
  • malicious executables