Login / Signup
Current work on authentication.
Andrew Birrell
Butler W. Lampson
Roger M. Needham
Michael D. Schroeder
Published in:
ACM SIGOPS European Workshop (1986)
Keyphrases
</>
data sets
databases
neural network
data mining
artificial intelligence
security analysis