Login / Signup

Chain reduction of authorisation certificates.

Yki KortesniemiTimo KiravuoMikko SäreläHannu H. Kari
Published in: Int. J. Secur. Networks (2015)
Keyphrases
  • access control
  • reduction method
  • data sets
  • evolutionary algorithm
  • public key
  • databases
  • face recognition
  • real time
  • computer vision
  • data structure
  • video sequences
  • relational databases