Login / Signup
Two Protocols for Delegation of Computation.
Ran Canetti
Ben Riva
Guy N. Rothblum
Published in:
ICITS (2012)
Keyphrases
</>
database
data mining
machine learning
real world
case study
image sequences
video sequences
search algorithm
access control