Login / Signup
Hiding Names: Private Authentication in the Applied Pi Calculus.
Cédric Fournet
Martín Abadi
Published in:
ISSS (2002)
Keyphrases
</>
database
neural network
information systems
digital images
co occurrence
biometric authentication