Secure Data Outsourcing with Adversarial Data Dependency Constraints

Boxiang Dong, Wendy Wang, Jie Yang

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Scopus citations

Fingerprint

Dive into the research topics of 'Secure Data Outsourcing with Adversarial Data Dependency Constraints'. Together they form a unique fingerprint.

Keyphrases

Computer Science