Sign in

Secure Data Outsourcing with Adversarial Data Dependency Constraints.

Boxiang DongWendy Hui WangJie Yang
Published in: BigDataSecurity/HPSC/IDS (2016)
Keyphrases