Login / Signup
Avoiding Theoretical Optimality to Efficiently and Privately Retrieve Security Updates.
Justin Cappos
Published in:
Financial Cryptography (2013)
Keyphrases
</>
information security
database
access control
intrusion detection
security policies
security requirements
computer security
databases
query processing
distributed systems
security mechanisms
personal data
security systems
security problems
information assurance