Login / Signup
Order preserving secure provenance scheme for distributed networks.
Idrees Ahmed
Abid Khan
Mansoor Ahmed
Saif Ur Rehman Malik
Published in:
Comput. Secur. (2019)
Keyphrases
</>
order preserving
linear hashing
rights management
hash functions
minimal perfect hash functions
lightweight
peer to peer
key distribution
databases