Login / Signup
Towards Practical RAM Based Secure Computation.
Niklas Büscher
Alina Weber
Stefan Katzenbeisser
Published in:
ESORICS (2) (2018)
Keyphrases
</>
real time
authentication scheme
artificial intelligence
case study
public key
practical problems
encryption scheme