Login / Signup
Outsourced Computations Maintaining Confidentiality and Authenticity.
Stephan Krenn
Thomas Lorünser
Sebastian Ramacher
Florian Wohner
Published in:
ERCIM News (2023)
Keyphrases
</>
digital images
third party
access control
service providers
database
relational databases
information security
data sets
databases
real world
artificial intelligence
security properties
data confidentiality