Login / Signup
Position-Based Cryptography.
Nishanth Chandran
Vipul Goyal
Ryan Moriarty
Rafail Ostrovsky
Published in:
SIAM J. Comput. (2014)
Keyphrases
</>
cellular automata
information security
three dimensional
machine learning
objective function
data sets
databases
neural network
data mining
decision making
bayesian networks
user interface
position and orientation