Login / Signup
A survey of applications of threshold cryptography - proposed and practiced.
Vishnu Venukumar
Vinod Pathari
Published in:
Inf. Secur. J. A Glob. Perspect. (2016)
Keyphrases
</>
cellular automata
information security
threshold selection
computer vision
group testing
database
real time
databases
neural network
decision making
high level
face recognition
multi agent systems
preprocessing