Login / Signup
-Permutation Protection Schemes.
Hongjun Wu
Feng Bao
Dingfeng Ye
Robert H. Deng
Published in:
ACISP (2000)
Keyphrases
</>
protection schemes
access control
privacy protection
operating system
data encryption
database
information systems
relational databases