Login / Signup
The effectiveness of receipt-based attacks on ThreeBallot.
Kevin J. Henry
Douglas R. Stinson
Jiayuan Sui
Published in:
IEEE Trans. Inf. Forensics Secur. (2009)
Keyphrases
</>
artificial intelligence
databases
neural network
information retrieval
bayesian networks
cooperative
evolutionary algorithm