Sign in

Designing a fast log-tracing scheme for targeted attack prevention.

Takuya SuzukiKoki IkedaPichaya KietkaroonJunichi MurayamaTakahiro HamadaYuichi Murata
Published in: APSITT (2015)
Keyphrases
  • neural network
  • case study
  • image quality
  • authentication protocol
  • secret sharing scheme
  • database
  • data sets
  • classification scheme
  • representation scheme
  • security analysis
  • key distribution
  • malicious users