Login / Signup
Coin-based Secure Computations.
Yuichi Komano
Takaaki Mizuki
Published in:
Int. J. Inf. Sec. (2022)
Keyphrases
</>
security requirements
data encryption
lightweight
cryptographic protocols
security level
information retrieval
group communication
database
key management
integrity verification
stream cipher
identity management
standard model
security mechanisms
multi party
intrusion detection
data mining
real world