Login / Signup
Drone Targeted Cryptography.
Gideon Samid
Published in:
IACR Cryptol. ePrint Arch. (2016)
Keyphrases
</>
cellular automata
encryption algorithms
databases
information security
target audience
computer vision
information systems
real time
data sets
web services
decision trees
database systems
data structure
information technology