Login / Signup
Efficient, Compromise Resilient and Append-Only Cryptographic Schemes for Secure Audit Logging.
Attila Altay Yavuz
Peng Ning
Michael K. Reiter
Published in:
Financial Cryptography (2012)
Keyphrases
</>
provably secure
cryptographic protocols
cost effective
key management
public key encryption
neural network
data mining
trade off
intrusion detection
data mining techniques
lightweight
security protocols
security properties
key management scheme