Login / Signup
Secure Ordered Bucketization.
Younho Lee
Published in:
IEEE Trans. Dependable Secur. Comput. (2014)
Keyphrases
</>
security requirements
security level
security analysis
scalar product
identity management
data mining
security mechanisms
key management
sensitive data
standard model
digital signature
lightweight
authentication scheme
database systems
key exchange
ordered sets
case study