Login / Signup

Analyzing a Family of Key Protection Schemes against Modification Attacks.

Tieyan LiGuilin Wang
Published in: IEEE Trans. Dependable Secur. Comput. (2011)
Keyphrases
  • protection schemes
  • privacy protection
  • access control
  • data encryption
  • operating system
  • data sets
  • data quality
  • block cipher