Login / Signup
Multi-input Functional Encryption and Its Application in Outsourcing Computation.
Peili Li
Haixia Xu
Yuanyuan Ji
Published in:
ICICS (2015)
Keyphrases
</>
information technology
information systems
data sets
neural network
input data
service providers
real time
business process
security properties
supplier selection
functional properties
encryption algorithms