Login / Signup

Your Credentials Are Compromised, Do Not Panic: You Can Be Well Protected.

Issa KhalilZuochao DouAbdallah Khreishah
Published in: AsiaCCS (2016)
Keyphrases
  • access control
  • trust negotiation
  • private data
  • data sets
  • information retrieval
  • decision trees
  • computational complexity
  • mobile devices
  • sensitive data
  • access control policies
  • data protection
  • critical information