Login / Signup
Security Evaluation on Secret Computation without Changing the Polynomial Degree.
Ken Aoi
Takeshi Shingu
Keiichi Iwamura
Published in:
AINA Workshops (2017)
Keyphrases
</>
neural network
intrusion detection
statistical databases
data sets
information assurance
low degree
security model
computer security
efficient computation
access control
database
evaluation model
evaluation methods
security issues
evaluation method
network security
security problems
security measures