Login / Signup

Deterministic Computation of Pseudorandomness in Sequences of Cryptographic Application.

Amparo Fúster-SabaterPino Caballero-GilOscar Delgado-Mohatar
Published in: ICCS (1) (2009)
Keyphrases
  • case study
  • social networks
  • hidden markov models
  • black box
  • parallel computation
  • machine learning
  • learning algorithm
  • decision making
  • access control
  • smart card
  • key technologies
  • security protocols