-
1
Confirmation method for the detection of malicious encrypted traffic with data privacy protection
Published 2022-02-01Subjects: Get full text
Article -
2
Secure User Authentication With Information Theoretic Security Using Secret Sharing-Based Secure Computation
Published 2025-01-01Subjects: Get full text
Article -
3
Design for secure two-party computation protocol based on ElGamal variant’s homomorphic
Published 2015-02-01Subjects: “…secure two-party computation…”
Get full text
Article