Login / Signup
Cryptographic Enforcement of Information Flow Policies Without Public Information.
Jason Crampton
Naomi Farley
Gregory Z. Gutin
Mark Jones
Bertram Poettering
Published in:
ACNS (2015)
Keyphrases
</>
information flow
information flows
communication networks
social networks
end users
information security
flow analysis
multi agent
information sharing