Multi-Server Verifiable Delegation of Computations: Unconditional Security and Practical Efficiency.
Liang Feng ZhangPublished in: CoRR (2021)
Keyphrases
- security policies
- access control
- real world
- information security
- sufficient conditions
- intrusion detection
- access control systems
- role based access control
- cross domain
- conflict resolution
- security management
- sensitive data
- information assurance
- database
- security level
- security model
- data security
- computer security
- security issues
- network security
- neural network