Login / Signup
File-injection Attack and Forward Security for Order-revealing Encryption.
Xingchen Wang
Yunlei Zhao
Published in:
IACR Cryptol. ePrint Arch. (2017)
Keyphrases
</>
countermeasures
cyber attacks
access control
encryption scheme
encryption algorithm
security measures
security vulnerabilities
anomaly detection
information security
security policies
key management
image encryption
key exchange
encryption algorithms