×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
The top documents tagged [compromised storage]
Documents
Attacking Cryptographic Schemes Based on Perturbation Polynomials Martin Albrecht (Royal Holloway), Craig Gentry (IBM), Shai Halevi (IBM), Jonathan Katz
216 views
Education
Privacy and integrity-preserving range queries
368 views
Documents
Top-k Query Result Completeness Verification.pdf
236 views