Sign in

Secure computing.

Himanshu TyagiPrakash NarayanPiyush Gupta
Published in: ISIT (2010)
Keyphrases
  • neural network
  • machine learning
  • real world
  • information retrieval
  • database systems
  • multi agent
  • key management
  • covert channel