Login / Signup
New security notions and feasibility results for authentication of quantum data.
Sumegha Garg
Henry Yuen
Mark Zhandry
Published in:
CoRR (2016)
Keyphrases
</>
data sets
data collection
database
data analysis
computer systems
training data
data structure
data sources
knowledge discovery
data processing
statistical databases
data integrity
end users
data mining techniques
original data
security analysis