No-leak authentication by the Sherlock Holmes method.
Dima GrigorievVladimir ShpilrainPublished in: IACR Cryptol. ePrint Arch. (2010)
Keyphrases
- synthetic data
- detection method
- pairwise
- significant improvement
- cost function
- dynamic programming
- experimental evaluation
- high accuracy
- theoretical analysis
- computationally efficient
- detection algorithm
- preprocessing
- similarity measure
- fully automatic
- clustering method
- optimization algorithm
- optimization method
- classification accuracy
- model selection
- support vector machine
- data sets
- computational cost
- objective function
- image segmentation
- learning algorithm