Login / Signup
Key-Leakage Resilient Revoke Scheme Resisting Pirates 2.0 in Bounded Leakage Model.
Duong Hieu Phan
Viet Cuong Trinh
Published in:
AFRICACRYPT (2013)
Keyphrases
</>
mathematical model
computational model
cost function
statistical model
analytical model
bayesian networks
reinforcement learning
objective function
real time
information retrieval
prior knowledge
probabilistic model
theoretical framework
experimental data
formal model
optimization scheme