Login / Signup
Foundations and Applications for Secure Triggers.
Ariel Futoransky
Emiliano Kargieman
Carlos Sarraute
Ariel Waissbein
Published in:
IACR Cryptol. ePrint Arch. (2005)
Keyphrases
</>
artificial intelligence
security analysis
highly efficient
security requirements
active databases
key management
information systems
lightweight
data sets
neural network
real world
social networks
identity management
data encryption
covert channel