Sign in

Towards Practical RAM Based Secure Computation.

Niklas BüscherAlina WeberStefan Katzenbeisser
Published in: ESORICS (2) (2018)
Keyphrases
  • real time
  • authentication scheme
  • artificial intelligence
  • case study
  • public key
  • practical problems
  • encryption scheme