Login / Signup
A novel one-to-many and many-to-one asymmetric encryption model and its algorithms.
Runhua Shi
Hong Zhong
Jie Cui
Shun Zhang
Published in:
Secur. Commun. Networks (2015)
Keyphrases
</>
optimization problems
management system
learning models
formal model
mathematical model
computational model
theoretical analysis
prior knowledge
computational complexity
data structure
feature selection
lower bound
em algorithm
objective function
experimental data
parameter values
data mining