Login / Signup
Involving Humans in the Cryptographic Loop: Introduction and Threat Analysis of EEVEHAC.
Julius Hekkala
Sara Nikula
Outi-Marja Latvala
Kimmo Halunen
Published in:
SECRYPT (2021)
Keyphrases
</>
data sets
artificial intelligence
data mining
three dimensional
statistical analysis
database
information retrieval
learning algorithm
image processing
clustering algorithm
multi agent
artificial neural networks