Login / Signup
Secure computing.
Himanshu Tyagi
Prakash Narayan
Piyush Gupta
Published in:
ISIT (2010)
Keyphrases
</>
neural network
machine learning
real world
information retrieval
database systems
multi agent
key management
covert channel