Login / Signup

Differentially secure multicasting and its implementation methods.

S. HolemanG. ManimaranJames DavisAnirban Chakrabarti
Published in: Comput. Secur. (2002)
Keyphrases
  • preprocessing
  • data mining
  • computational cost
  • empirical studies
  • benchmark datasets
  • real time
  • neural network
  • significant improvement
  • complexity analysis