Login / Signup
Digital High-Scale Food Security Analysis: Challenges, Considerations and Opportunities.
Timothy Mulrooney
Tysean Wooten
Published in:
GISTAM (Selected Papers) (2020)
Keyphrases
</>
security analysis
public key
security requirements
security properties
security model
smart card
high security
encryption algorithm
image encryption
mutual authentication
encryption scheme
authentication protocol
proxy signature scheme
data mining techniques
image compression
user authentication