Login / Signup
How to Secure Matchings Against Edge Failures.
Viktor Bindewald
Felix Hommelsheim
Moritz Mühlenthaler
Oliver Schaudt
Published in:
CoRR (2018)
Keyphrases
</>
edge detection
edge information
disjoint paths
edge detector
security issues
security analysis
standard model
user authentication
multiple scales
edge direction
commit protocols
authentication scheme
cryptographic protocols
root cause
database
image gradient
lightweight
image processing
neural network