Login / Signup

A survey of applications of threshold cryptography - proposed and practiced.

Vishnu VenukumarVinod Pathari
Published in: Inf. Secur. J. A Glob. Perspect. (2016)
Keyphrases
  • cellular automata
  • information security
  • threshold selection
  • computer vision
  • group testing
  • database
  • real time
  • databases
  • neural network
  • decision making
  • high level
  • face recognition
  • multi agent systems
  • preprocessing