Login / Signup
Encryption Schemes for Computer Confidentiality.
Vera Pless
Published in:
IEEE Trans. Computers (1977)
Keyphrases
</>
encryption scheme
standard model
access control
ciphertext
public key
public key encryption
security model
database
secret key
encryption key
security analysis
information security
databases
lossless compression
data sharing
hash functions
e government
proxy re encryption
image data
homomorphic encryption