Login / Signup

Secure Merge with O(n log log n) Secure Operations.

Brett Hemenway FalkRafail Ostrovsky
Published in: ITC (2021)
Keyphrases
  • key management
  • databases
  • lightweight
  • security analysis
  • key distribution
  • security level
  • worst case
  • security issues
  • security requirements
  • security protocols
  • user authentication
  • security measures
  • stream cipher