C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
Cryptographic enforcement of information flow policies without public information via tree partitions.
Jason Crampton
Naomi Farley
Gregory Z. Gutin
Mark Jones
Bertram Poettering
Published in:
J. Comput. Secur. (2017)
Keyphrases
</>
information flow
information flows
flow analysis
social networks
real world
computer systems
knowledge discovery
information security
communication networks
multi context systems