Login / Signup
Secure Computation Using Leaky Tokens.
Manoj Prabhakaran
Amit Sahai
Akshay Wadia
Published in:
ICALP (1) (2014)
Keyphrases
</>
data mining
learning algorithm
security management
real time
machine learning
artificial intelligence
social networks
information systems
lightweight
parallel computation
security level
covert channel
method invocation