Login / Signup

An Approach of Secure Two-Way-Pegged Multi-sidechain.

Jinnan GuoKeke GaiLiehuang ZhuZijian Zhang
Published in: ICA3PP (2) (2019)
Keyphrases
  • factor authentication
  • database
  • neural network
  • real time
  • data sets
  • decision trees
  • similarity measure
  • key exchange protocol