Login / Signup

-Permutation Protection Schemes.

Hongjun WuFeng BaoDingfeng YeRobert H. Deng
Published in: ACISP (2000)
Keyphrases
  • protection schemes
  • access control
  • privacy protection
  • operating system
  • data encryption
  • database
  • information systems
  • relational databases