Login / Signup
Bellcore attack in practice.
Andrey Sidorenko
Joachim van den Berg
Remko Foekema
Michiel Grashuis
Jaap de Vos
Published in:
IACR Cryptol. ePrint Arch. (2012)
Keyphrases
</>
database
data sets
real world
artificial intelligence
computer vision
information systems
case study
image sequences
multi agent
video sequences
secret key