Protocols Using Keys from Faulty Data (Transcript of Discussion).
David WheelerPublished in: Security Protocols Workshop (2001)
Keyphrases
- data sets
- data collection
- synthetic data
- original data
- data structure
- high dimensional data
- knowledge discovery
- data objects
- database
- raw data
- data processing
- data mining techniques
- small number
- image data
- end users
- prior knowledge
- data points
- statistical analysis
- data sources
- missing data
- data acquisition
- feature selection
- neural network