Login / Signup

Policy-Based Cryptography and Applications.

Walid BaggaRefik Molva
Published in: Financial Cryptography (2005)
Keyphrases
  • cellular automata
  • optimal policy
  • neural network
  • information security
  • learning algorithm
  • data sets
  • search engine
  • databases
  • decision making
  • decision process