Login / Signup
Analyzing a Family of Key Protection Schemes against Modification Attacks.
Tieyan Li
Guilin Wang
Published in:
IEEE Trans. Dependable Secur. Comput. (2011)
Keyphrases
</>
protection schemes
privacy protection
access control
data encryption
operating system
data sets
data quality
block cipher