Theft-Protected Proprietary Certificates.
Alexandra BoldyrevaMarkus JakobssonPublished in: Digital Rights Management Workshop (2002)
Keyphrases
- data protection
- access control
- sensitive data
- open source
- public key
- information security
- privacy preserving
- rfid tags
- data security
- data storage
- real time
- insider threat
- sensitive information
- data sharing
- third party
- computer vision
- databases
- smart card
- private information
- data management
- privacy protection
- data structure
- image sequences
- data privacy
- security architecture
- trusted third party
- database
- public key infrastructure