Article,

Cryptographic enforcement of information flow policies without public information via tree partitions.

, , , , and .
Journal of Computer Security, 25 (6): 511-535 (2017)

Meta data

Tags

Users

  • @dblp

Comments and Reviews