Login / Signup
A New Security Model for Secure Thresholding.
Nan Hu
Sen-Ching S. Cheung
Published in:
ICASSP (2) (2007)
Keyphrases
</>
security model
security requirements
security analysis
public key
security architecture
access control
provably secure
encryption scheme
designated verifier
security properties
image processing
public key cryptography
security policies
databases
data integration
authentication protocol