Login / Signup
Foundations and applications for secure triggers.
Ariel Futoransky
Emiliano Kargieman
Carlos Sarraute
Ariel Waissbein
Published in:
ACM Trans. Inf. Syst. Secur. (2006)
Keyphrases
</>
artificial intelligence
lightweight
data sets
multi party
security requirements
key management
database
neural network
data mining
low cost
standard model
user authentication
cryptographic protocols