Login / Signup
How to Securely Outsource Cryptographic Computations.
Susan Hohenberger
Anna Lysyanskaya
Published in:
TCC (2005)
Keyphrases
</>
third party
smart card
sensitive information
service providers
hash functions
transaction costs
trusted third party
anomaly detection
cellular automata
security protocols
encryption key