Keyphrases
- signature verification
- model checking
- neural network
- conflict resolution
- access control
- cross domain
- false acceptance rate
- access control systems
- formal verification
- real time
- hidden markov models
- decision trees
- network security
- database
- website
- signature scheme
- formal methods
- e learning
- genetic algorithm
- person identification
- fingerprint verification
- trust relationships
- concurrent systems
- information retrieval