Login / Signup
A new method of formalizing anonymity based on protocol composition logic.
Tao Feng
Shining Han
Xian Guo
Donglin Ma
Published in:
Secur. Commun. Networks (2015)
Keyphrases
</>
detection method
high precision
high accuracy
genetic algorithm
image segmentation
similarity measure
experimental evaluation
computational cost
lightweight
knowledge base
dynamic programming
support vector machine
clustering method