Login / Signup
Bypassing information leakage protection with trusted applications.
Jorge Blasco Alís
Julio César Hernández Castro
Juan E. Tapiador
Arturo Ribagorda
Published in:
Comput. Secur. (2012)
Keyphrases
</>
information leakage
personal information
privacy guarantees
sensitive information
secret information
privacy protection
differential privacy
information security
data quality
data sets
digital images
data privacy
private data