Login / Signup
Lattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasures.
Yunhai Zheng
Chengliang Tian
Hanlin Zhang
Jia Yu
Fengjun Li
Published in:
J. Comput. Syst. Sci. (2021)
Keyphrases
</>
countermeasures
single server
information systems
information security
retrial queue
databases
data mining
machine learning
decision making
optimal solution
information technology
search space
data warehouse
markov chain