Login / Signup
Obscured Asymmetric Crypto-Functions for Secured Identification.
Wael Adi
Shaza Zeitouni
Published in:
EST (2014)
Keyphrases
</>
data sets
database
real world
machine learning
decision making
automatic identification