Login / Signup

Foundations and applications for secure triggers.

Ariel FutoranskyEmiliano KargiemanCarlos SarrauteAriel Waissbein
Published in: ACM Trans. Inf. Syst. Secur. (2006)
Keyphrases
  • artificial intelligence
  • lightweight
  • data sets
  • multi party
  • security requirements
  • key management
  • database
  • neural network
  • data mining
  • low cost
  • standard model
  • user authentication
  • cryptographic protocols