Login / Signup

Towards verifiable outsourced middleboxes.

Xingliang YuanHuayi DuanCong Wang
Published in: ICNP (2016)
Keyphrases
  • third party
  • sufficient conditions
  • service providers
  • secret sharing
  • machine learning
  • computer vision
  • xml documents
  • domain knowledge