Login / Signup
The Effectiveness of Receipt-Based Attacks on ThreeBallot.
Kevin J. Henry
Douglas R. Stinson
Jiayuan Sui
Published in:
IACR Cryptol. ePrint Arch. (2007)
Keyphrases
</>
case study
neural network
data mining
genetic algorithm
database systems
multiscale
computer systems
computer security
attack detection