Data in the Cloud: Authentication Without Leaking

Provided by: Topic: Cloud Format: Webcast
Assurance of authenticity as well as confidentiality of data is an important problem, in cloud computing and in third-party data distribution environments. Existing data authentication schemes for structured and semi-structured data such as trees and graphs leak information, leading to privacy and confidentiality breaches.

Find By Topic