Login / Signup
Instances and Cryptographic Applications.
Danny Harnik
Moni Naor
Published in:
SIAM J. Comput. (2010)
Keyphrases
</>
smart card
databases
training instances
key management
machine learning
cryptographic protocols
data sets
instance selection
randomly generated
scheduling problem
lower bound
case study
website
search engine
learning algorithm
data mining
real world