Login / Signup
Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop.
Oded Goldreich
Birgit Pfitzmann
Ronald L. Rivest
Published in:
IACR Cryptol. ePrint Arch. (1997)
Keyphrases
</>
access control
access control systems
conflict resolution
information retrieval
multi agent
database
real time
data sets
genetic algorithm
artificial intelligence
cooperative