Login / Signup
Replaceable and securely hashed keys from online signatures.
Wai Kuan Yip
Andrew Beng Jin Teoh
David Chek Ling Ngo
Published in:
IEICE Electron. Express (2006)
Keyphrases
</>
hash functions
online learning
neural network
machine learning
information systems
integrity constraints
internet users
real time
data sets
decision trees
hidden markov models
signature verification