Login / Signup
Deterministic Computation of Pseudorandomness in Sequences of Cryptographic Application.
Amparo Fúster-Sabater
Pino Caballero-Gil
Oscar Delgado-Mohatar
Published in:
ICCS (1) (2009)
Keyphrases
</>
case study
social networks
hidden markov models
black box
parallel computation
machine learning
learning algorithm
decision making
access control
smart card
key technologies
security protocols