Login / Signup
Encrypted computing: Speed, security and provable obfuscation against insiders.
Peter T. Breuer
Jonathan P. Bowen
Esther Palomar
Zhiming Liu
Published in:
ICCST (2017)
Keyphrases
</>
encryption decryption
malware detection
high speed
encryption key
encryption scheme
access control
information security
security requirements
security policies
security issues
static analysis
intrusion detection
data security
encryption algorithm
data privacy
computer security
real time
computer systems