Sign in

Computational SS and conversion protocols in both active and passive settings.

Ryo KikuchiDai IkarashiKoji ChidaKoki HamadaWakaha Ogata
Published in: IET Inf. Secur. (2017)
Keyphrases
  • communication protocols
  • similarity measure
  • digital libraries
  • voting protocols
  • database
  • data sets
  • genetic algorithm
  • website
  • relational databases
  • computational models
  • computational power