Login / Signup
Your Credentials Are Compromised, Do Not Panic: You Can Be Well Protected.
Issa Khalil
Zuochao Dou
Abdallah Khreishah
Published in:
AsiaCCS (2016)
Keyphrases
</>
access control
trust negotiation
private data
data sets
information retrieval
decision trees
computational complexity
mobile devices
sensitive data
access control policies
data protection
critical information