Login / Signup
Optimal Key-Trees for Tree-Based Private Authentication.
Levente Buttyán
Tamás Holczer
István Vajda
Published in:
Privacy Enhancing Technologies (2006)
Keyphrases
</>
dynamic programming
machine learning
optimal solution
worst case
decision trees
optimal control
optimal design
tree construction
binary search trees
neural network
information systems
data structure
security analysis