Login / Signup

Hiding Names: Private Authentication in the Applied Pi Calculus.

Cédric FournetMartín Abadi
Published in: ISSS (2002)
Keyphrases
  • database
  • neural network
  • information systems
  • digital images
  • co occurrence
  • biometric authentication