Login / Signup

Two Protocols for Delegation of Computation.

Ran CanettiBen RivaGuy N. Rothblum
Published in: ICITS (2012)
Keyphrases
  • database
  • data mining
  • machine learning
  • real world
  • case study
  • image sequences
  • video sequences
  • search algorithm
  • access control