Data in the Cloud: Authentication Without Leaking

Watch Now
Provided by:
Topic: Cloud
Format: Webcast
Assurance of authenticity as well as confidentiality of data is an important problem, in cloud computing and in third-party data distribution environments. Existing data authentication schemes for structured and semi-structured data such as trees and graphs leak information, leading to privacy and confidentiality breaches.
Watch Now

Find By Topic