Login / Signup
Safe Areas of Computation for Secure Computing with Insecure Applications.
André L. M. dos Santos
Richard A. Kemmerer
Published in:
ACSAC (1999)
Keyphrases
</>
efficiently computing
efficient computation
key distribution
authentication scheme
authentication protocol
diffie hellman
data mining
image sequences
fault tolerant
secret key
user authentication
scalar product
ubiquitous computing and ambient intelligence