Analysis and Implementation of a Method Resistant to Functional Dependency Attacks on Databases with Sensitive Records

EMU I-REP

Files in this item

This item appears in the following Collection(s)