Login / Signup
Unconditionally Secure Information Authentication in Presence of Erasures.
Goce Jakimoski
Published in:
IMACC (2005)
Keyphrases
</>
information sources
information sharing
spatial information
end users
information extraction
keywords
information processing
private information