Login / Signup
Constructing cryptographic definitions.
Phillip Rogaway
Published in:
ISC Int. J. Inf. Secur. (2011)
Keyphrases
</>
smart card
neural network
database
genetic algorithm
face recognition
relational databases
multiresolution
access control
key management
security protocols
s box