Login / Signup
Correcting Errors in Private Keys Obtained from Cold Boot Attacks.
Hyung Tae Lee
HongTae Kim
Yoo-Jin Baek
Jung Hee Cheon
Published in:
ICISC (2011)
Keyphrases
</>
privacy preserving
neural network
data mining
hash functions
artificial neural networks
error detection
data corruption