Login / Signup
Enhancing security for two-party comparison over encrypted data.
Ching-Nung Yang
Zong-Xuan Yeh
Shen-Chieh Hsu
Zhangjie Fu
Published in:
ICSAI (2016)
Keyphrases
</>
encryption scheme
sensitive data
encrypted data
cloud storage
network security
encryption algorithm
access control
information security
key agreement protocol
third party
security requirements
information systems
security policies
intrusion detection
rfid tags
security analysis
privacy preserving
databases