Scaling Cryptographic Techniques by Exploiting Data Sensitivity at a Public Cloud.
Sharad MehrotraShantanu SharmaJeffrey D. UllmanPublished in: CODASPY (2019)
Keyphrases
- data sets
- database
- data structure
- raw data
- data sources
- data points
- data collection
- data processing
- training data
- complex data
- big data
- data quality
- synthetic data
- computer systems
- image data
- end users
- data analysis
- databases
- input data
- data mining techniques
- statistical analysis
- high dimensional data
- prior knowledge
- original data
- database systems
- decision trees