Login / Signup
Vulnerabilities in the Adachi-Aoki-Komano-Ohta Micropayment Scheme.
Minho Kim
Çetin Kaya Koç
Published in:
Int. J. Netw. Secur. (2007)
Keyphrases
</>
data sets
information security
decision trees
neural network
information retrieval
learning algorithm
database systems
image sequences
security analysis
detection scheme
security vulnerabilities