Login / Signup
Cryptographic Enforcement of Information Flow Policies without Public Information.
Jason Crampton
Naomi Farley
Gregory Z. Gutin
Mark Jones
Bertram Poettering
Published in:
CoRR (2014)
Keyphrases
</>
information flow
information flows
information sharing
communication networks
flow analysis
end users
case study
multi agent systems