Login / Signup
Malicious Security for SCALES - Outsourced Computation with Ephemeral Servers.
Anasuya Acharya
Carmit Hazay
Vladimir Kolesnikov
Manoj Prabhakaran
Published in:
CRYPTO (9) (2024)
Keyphrases
</>
malicious users
information security
malicious attacks
third party
network security
access control
security threats
data center
security issues
service providers
intrusion detection
information systems
security requirements
computer security
security analysis
security protocols
cloud computing
malicious activities