Cryptology (11) | ![]() |
Homomorphic encryption (5) | ![]() |
G#1v 6927 Cryptology G#2v 6928 Cryptology 0#3#cryptographic key Cryptology 0#3#cryptologist Cryptology
0#3#cryptology Cryptology G#2v 6929 Homomorphic encryption 0#3#homomorphic encryption Homomorphic encryption G#1v 7764 Data
G#2v 7765 Backup 0#3#backup Backup G#2v 7766 Big data G#3v 7767 Big data
0#4#big data Big data G#3v 7768 Big data analytics 0#4#big data analytics Big data analytics G#3v 7769 Hadoop
0#4#hadoop Hadoop G#3v 7770 Massive data 0#4#massive data Massive data G#2v 7771 Computer data storage
to the publisher's cryptographic key Security Design for an Inter-Domain Publish/Subscribe Architecture 175
representing, for instance, agents, request numbers, or cryptographic keys) into ï nitely many equivalence classes and to compute on those equivalence classes
Sensitive cryptographic keys, stored inside the token, should not be revealed to the outside and it should be impossible for an attacker to change those keys
< Back - Next >
Overtext Web Module V3.0 Alpha
Copyright Semantic-Knowledge, 1994-2011