Login / Signup
Directed Signatures and Application to Threshold Cryptosystems.
Chae Hoon Lim
Pil Joong Lee
Published in:
Security Protocols Workshop (1996)
Keyphrases
</>
real world
genetic algorithm
database
real time
neural network
machine learning
information systems
case study
bayesian networks
wireless sensor networks