Login / Signup
Attacking and Repairing Batch Verification Schemes.
Colin Boyd
Chris Pavlovski
Published in:
ASIACRYPT (2000)
Keyphrases
</>
model checking
neural network
artificial intelligence
case study
face verification
signature verification
formal verification
person identification
concurrent systems
machine learning
information retrieval
similarity measure
multiscale
bit rate
database
integrity constraints
batch mode
batch processing