Login / Signup
Policy-Based Cryptography and Applications.
Walid Bagga
Refik Molva
Published in:
Financial Cryptography (2005)
Keyphrases
</>
cellular automata
optimal policy
neural network
information security
learning algorithm
data sets
search engine
databases
decision making
decision process