Login / Signup
Password authenticated key exchange using hidden smooth subgroups.
Craig Gentry
Philip D. MacKenzie
Zulfikar Ramzan
Published in:
CCS (2005)
Keyphrases
</>
information exchange
subgroup discovery
information technology
neural network
artificial intelligence
social networks
search algorithm
association rules
multiresolution
denoising
hidden information