Login / Signup
Unrestricted Secure Computing.
Greg Madden
John B. Tyndall
Published in:
SIGUCCS (2014)
Keyphrases
</>
neural network
data mining
data structure
real time
data sets
real world
genetic algorithm
artificial intelligence
bayesian networks
privacy preserving
highly efficient
security issues
security requirements
encryption scheme
security analysis