Sign in

Order preserving secure provenance scheme for distributed networks.

Idrees AhmedAbid KhanMansoor AhmedSaif Ur Rehman Malik
Published in: Comput. Secur. (2019)
Keyphrases
  • order preserving
  • linear hashing
  • rights management
  • hash functions
  • minimal perfect hash functions
  • lightweight
  • peer to peer
  • key distribution
  • databases