Login / Signup
Weakening the perfect encryption assumption in Dolev-Yao adversaries.
Roberto Zunino
Pierpaolo Degano
Published in:
Theor. Comput. Sci. (2005)
Keyphrases
</>
encryption scheme
databases
data mining
machine learning
secret key
data encryption