Login / Signup

Request-Based Comparable Encryption.

Jun Furukawa
Published in: ESORICS (2013)
Keyphrases
  • encryption algorithms
  • neural network
  • information hiding
  • image encryption
  • real world
  • machine learning
  • digital libraries
  • encryption scheme
  • significantly lower