Login / Signup
An Efficient Hierarchical Identity-Based Key-Sharing Method Resistant against Collusion-Attacks.
Goichiro Hanaoka
Tsuyoshi Nishioka
Yuliang Zheng
Hideki Imai
Published in:
ASIACRYPT (1999)
Keyphrases
</>
experimental evaluation
detection method
cost function
objective function
dynamic programming
synthetic data
high precision
pairwise
probabilistic model
high accuracy
edge detection
feature space
multiresolution
computational cost
support vector machine svm