Login / Signup
Almost-Everywhere Secure Computation with Edge Corruptions.
Nishanth Chandran
Juan A. Garay
Rafail Ostrovsky
Published in:
J. Cryptol. (2015)
Keyphrases
</>
edge detection
edge information
security issues
feature extraction
input image
weighted graph
standard model