How to Protect Yourself without Perfect Shredding (Q3519529)
From MaRDI portal
| This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: How to Protect Yourself without Perfect Shredding |
scientific article
| Language | Label | Description | Also known as |
|---|---|---|---|
| English | How to Protect Yourself without Perfect Shredding |
scientific article |
Statements
How to Protect Yourself without Perfect Shredding (English)
0 references
19 August 2008
0 references
mobile adversary
0 references
proactive security
0 references
adaptive security
0 references
forward security
0 references
intrusion resilience
0 references
universal hashing
0 references
partial erasures
0 references
secure multiparty computation
0 references
randomness extractors
0 references