Login / Signup

Shear-Based Spatial Transformation to Protect Proximity Attack in Outsourced Database.

Al Amin HossainSeung-Jin LeeEui-Nam Huh
Published in: TrustCom/ISPA/IUCC (2013)
Keyphrases