Login / Signup
Computationally Sound Typing for Non-interference: The Case of Deterministic Encryption.
Judicaël Courant
Cristian Ene
Yassine Lakhnech
Published in:
FSTTCS (2007)
Keyphrases
</>
data sets
neural network
secret key
security properties
power line