-
1
Confirmation method for the detection of malicious encrypted traffic with data privacy protection
Published 2022-02-01Subjects: Get full text
Article -
2
Design for secure two-party computation protocol based on ElGamal variant’s homomorphic
Published 2015-02-01Subjects: “…secure two-party computation…”
Get full text
Article