Computing on Authenticated Data
@inproceedings{ABCHSW12,
title={Computing on Authenticated Data},
author="J.Ahn, D.Boneh, J.Camenisch, S.Hohenberger, a.shelat, and B.Waters",
booktitle="Theory of Cryptography Conference 2012",
year="2012"
}
@inproceedings{ABCHSW12,
title={Computing on Authenticated Data},
author="J.Ahn, D.Boneh, J.Camenisch, S.Hohenberger, a.shelat, and B.Waters",
booktitle="Theory of Cryptography Conference 2012",
year="2012"
}