Login / Signup
Vulnerability analysis of certificate graphs.
Eunjin Jung
Mohamed G. Gouda
Published in:
Int. J. Secur. Networks (2006)
Keyphrases
</>
graph theory
graph theoretic
directed graph
graph representation
graph mining
graph matching
complex structures
graph clustering
structured objects
data sets
image segmentation
graph databases
graph partitioning
graph kernels
graph structures
series parallel