Login / Signup

Access with Pseudonyms.

Lidong Chen
Published in: Cryptography: Policy and Algorithms (1995)
Keyphrases
  • neural network
  • access control
  • random access
  • database
  • real time
  • artificial intelligence
  • multiscale
  • special case