Login / Signup

Correcting Errors in Private Keys Obtained from Cold Boot Attacks.

Hyung Tae LeeHongTae KimYoo-Jin BaekJung Hee Cheon
Published in: ICISC (2011)
Keyphrases
  • privacy preserving
  • neural network
  • data mining
  • hash functions
  • artificial neural networks
  • error detection
  • data corruption