Using Delay to Defend Against Database Extraction

In  Proceedings of the Workshop on Secure Data Management in a Connected World

Details

TypeInproceedings
> Publications > Using Delay to Defend Against Database Extraction