Login / Signup

Computationally Sound Typing for Non-interference: The Case of Deterministic Encryption.

Judicaël CourantCristian EneYassine Lakhnech
Published in: FSTTCS (2007)
Keyphrases
  • data sets
  • neural network
  • secret key
  • security properties
  • power line