Author of the publication

Privacy Amplification Strategies in Sequential Secret Key Distillation Protocols Based on Machine Learning.

, , , and . Symmetry, 14 (10): 2028 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cepstral Distance Measures of Hormone Concentration Time Series., , , and . MedInfo, volume 52 of Studies in Health Technology and Informatics, page 385-388. IOS Press, (1998)Fuzzy commitment scheme for generation of cryptographic keys based on iris biometrics., , , , and . IET Biom., 6 (2): 89-96 (2017)Local echo canceler with optimal input for true full-duplex speech scrambling system., , , and . IEEE Trans. Signal Process., 50 (8): 1877-1882 (2002)Reliable Baselines for Sentiment Analysis in Resource-Limited Languages: The Serbian Movie Review Dataset., , and . LREC, European Language Resources Association (ELRA), (2016)Privacy Amplification Strategies in Sequential Secret Key Distillation Protocols Based on Machine Learning., , , and . Symmetry, 14 (10): 2028 (2022)Multimodal Speaker Verification Based on Electroglottograph Signal and Glottal Activity Detection., , and . EURASIP J. Adv. Signal Process., (2010)An Interactive and Collaborative Approach to Teaching Cryptology., , , , and . J. Educ. Technol. Soc., 17 (1): 197-205 (2014)Steganographic Method in Selected Areas of the Stego-Carrier in the Spatial Domain., , and . Symmetry, 15 (5): 1015 (April 2023)Secret-Key Agreement by Asynchronous EEG over Authenticated Public Channels., , , , , and . Entropy, 23 (10): 1327 (2021)A Generic Model of the Pseudo-Random Generator Based on Permutations Suitable for Security Solutions in Computationally-Constrained Environments., , and . Sensors, 19 (23): 5322 (2019)