Login / Signup

On edge caching in the presence of malicious users.

Frederic GabryValerio BioglioIngmar Land
Published in: ICC Workshops (2016)
Keyphrases
  • malicious users
  • query processing
  • data access
  • prefetching
  • edge detection
  • sensitive data
  • high dimensional
  • intrusion detection
  • databases
  • data mining
  • access control