Login / Signup
Tight security proofs for the bounded-storage model.
Stefan Dziembowski
Ueli M. Maurer
Published in:
STOC (2002)
Keyphrases
</>
probabilistic model
computational model
mathematical model
cost function
security model
neural network
bayesian networks
probability distribution
network security
database
learning algorithm
high level
em algorithm
statistical model
prediction model