Login / Signup
On edge caching in the presence of malicious users.
Frederic Gabry
Valerio Bioglio
Ingmar Land
Published in:
ICC Workshops (2016)
Keyphrases
</>
malicious users
query processing
data access
prefetching
edge detection
sensitive data
high dimensional
intrusion detection
databases
data mining
access control