Login / Signup

Revocation in Publicly Verifiable Outsourced Computation.

James AldermanChristian JansonCarlos CidJason Crampton
Published in: Inscrypt (2014)
Keyphrases
  • access control
  • third party
  • data sets
  • information systems
  • real time
  • machine learning
  • case study
  • three dimensional
  • multi agent
  • sufficient conditions
  • parallel computation