Login / Signup

Secrecy types for a simulatable cryptographic library.

Peeter Laud
Published in: CCS (2005)
Keyphrases
  • key management
  • security properties
  • databases
  • real time
  • smart card
  • neural network
  • database systems