Authentication of Copy Detection Patterns A Pattern Reliability Based Approach
Authentication of Copy Detection Patterns A Pattern Reliability Based Approach
Authenticated Outlier Mining for Outsourced Databases
Authenticated Outlier Mining for Outsourced Databases