Login / Signup

Weakening the perfect encryption assumption in Dolev-Yao adversaries.

Roberto ZuninoPierpaolo Degano
Published in: Theor. Comput. Sci. (2005)
Keyphrases
  • encryption scheme
  • databases
  • data mining
  • machine learning
  • secret key
  • data encryption