Login / Signup
Almost-Everywhere Secure Computation with Edge Corruptions.
Nishanth Chandran
Juan A. Garay
Rafail Ostrovsky
Published in:
IACR Cryptol. ePrint Arch. (2012)
Keyphrases
</>
edge detection
data sets
edge information
security analysis
genetic algorithm
image segmentation
edge detector
efficient computation