Login / Signup
Secure Audit Logs with Verifiable Excerpts.
Gunnar Hartung
Published in:
IACR Cryptol. ePrint Arch. (2016)
Keyphrases
</>
secret sharing
sufficient conditions
intrusion detection
log data
secret sharing scheme
database
lightweight
security level
authentication scheme
identity management
data encryption
website
data mining techniques
anomaly detection
security management
authentication mechanism