Multi-Terminal Two-Hop Untrusted-Relay Networks With Hierarchical Security Guarantees.
Ahmed A. ZewailAylin YenerPublished in: IEEE Trans. Inf. Forensics Secur. (2017)
Keyphrases
- security policies
- sensitive data
- information security
- social networks
- factor authentication
- security issues
- access control
- network security
- intrusion detection
- third party
- computer networks
- statistical databases
- network structure
- security requirements
- privacy preserving
- data privacy
- enterprise network
- outsourced databases
- communication networks
- end to end
- security model