Login / Signup
Cryptographically secure shields.
Jean-Michel Cioranesco
Jean-Luc Danger
Tarik Graba
Sylvain Guilley
Yves Mathieu
David Naccache
Xuan Thuy Ngo
Published in:
HOST (2014)
Keyphrases
</>
security level
real time
security issues
encryption scheme
security analysis
trusted computing
data encryption
search engine
social networks
digital libraries
security requirements
cryptographic protocols
identity management
key exchange protocol