Login / Signup
What about Vulnerability to a Fault Attack of the Miller's Algorithm During an Identity Based Protocol?.
Nadia El Mrabet
Published in:
ISA (2009)
Keyphrases
</>
cost function
detection algorithm
learning algorithm
objective function
computational complexity
search space
np hard
optimization algorithm
preprocessing
dynamic programming
simulated annealing
matching algorithm
evolutionary algorithm
k means
worst case
segmentation algorithm