Login / Signup

Privacy-Preserving Application-to-Application Authentication Using Dynamic Runtime Behaviors.

Mihai ChristodorescuMaliheh ShirvanianShams Zawoad
Published in: CoRR (2022)
Keyphrases
  • privacy preserving
  • privacy preserving data mining