Login / Signup
Revocation in Publicly Verifiable Outsourced Computation.
James Alderman
Carlos Cid
Jason Crampton
Christian Janson
Published in:
IACR Cryptol. ePrint Arch. (2014)
Keyphrases
</>
sufficient conditions
decision trees
access control
neural network
image processing
evolutionary algorithm
third party
secret sharing