Login / Signup

Replaceable and securely hashed keys from online signatures.

Wai Kuan YipAndrew Beng Jin TeohDavid Chek Ling Ngo
Published in: IEICE Electron. Express (2006)
Keyphrases
  • hash functions
  • online learning
  • neural network
  • machine learning
  • information systems
  • integrity constraints
  • internet users
  • real time
  • data sets
  • decision trees
  • hidden markov models
  • signature verification