• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Request-Based Comparable Encryption.

Jun Furukawa
Published in: ESORICS (2013)
Keyphrases
  • encryption algorithms
  • neural network
  • information hiding
  • image encryption
  • real world
  • machine learning
  • digital libraries
  • encryption scheme
  • significantly lower