Login / Signup
When Should an Implementation Attack Be Viewed as Successful?
Werner Schindler
Published in:
Number Theory and Cryptography (2013)
Keyphrases
</>
hidden markov models
implementation issues
machine learning
efficient implementation
countermeasures
information systems
image processing
similarity measure
object oriented
implementation details