Articles with "leaker identification" as a keyword



Photo from wikipedia

Online information leaker identification scheme for secure data sharing

Sign Up to like & get
recommendations!
Published in 2020 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-020-09470-9

Abstract: This paper proposes a novel scheme for the leaker identification that deals with the dynamic scenario by handling the requests of the users in an online custom. A distribution strategy is introduced having less risk… read more here.

Keywords: scheme; online information; leaker; leaker identification ... See more keywords