Login / Signup
A New Public Remote Integrity Checking Scheme with User Privacy.
Yiteng Feng
Yi Mu
Guomin Yang
Joseph K. Liu
Published in:
ACISP (2015)
Keyphrases
</>
integrity checking
user privacy
integrity constraints
deductive databases
hard and soft constraints
constraint logic programming
malicious users
privacy preserving
databases
private information
identity management
database
data sets
data analysis