Login / Signup

Unconditionally Secure Information Authentication in Presence of Erasures.

Goce Jakimoski
Published in: IMACC (2005)
Keyphrases
  • information sources
  • information sharing
  • spatial information
  • end users
  • information extraction
  • keywords
  • information processing
  • private information