Login / Signup
Update on Cryptography: Who Will Keep the Keys?
Donn B. Parker
Published in:
Inf. Secur. J. A Glob. Perspect. (1994)
Keyphrases
</>
cellular automata
data model
information security
hash functions
machine learning
search algorithm
update operations