Login / Signup
An Ideal-Security Protocol for Order-Preserving Encoding.
Raluca A. Popa
Frank H. Li
Nickolai Zeldovich
Published in:
IEEE Symposium on Security and Privacy (2013)
Keyphrases
</>
order preserving
security protocols
linear hashing
security services
minimal perfect hash functions
artificial immune algorithm
authentication protocol
hash functions
key management
security mechanisms
rfid tags
security requirements
high dimensional
mobile devices
low cost