Search
Now showing items 1-2 of 2
Machine-aided analysis of vote privacy using computationally complete symbolic attacker
(University of Missouri--Columbia, 2019)
Security protocols employ cryptographic primitives such as encryption and digital signatures to provide security guarantees of confidentiality and authenticity in the presence of malicious attackers. Due to the complexities ...
Local and deep texture features for classification of natural and biomedical images
(University of Missouri--Columbia, 2019)
Developing efficient feature descriptors is very important in many computer vision applications including biomedical image analysis. In the past two decades and before the popularity of deep learning approaches in image ...