Keeping data secret under full compromise using porter devices.
Christina PöpperDavid A. BasinSrdjan CapkunCas CremersPublished in: ACSAC (2010)
Keyphrases
- data processing
- database
- high quality
- data analysis
- data structure
- data points
- embedded systems
- data sets
- training data
- raw data
- data distribution
- historical data
- complex data
- sensor data
- missing data
- synthetic data
- input data
- image data
- machine learning
- statistical analysis
- computer systems
- experimental data
- original data
- data quality
- knowledge discovery
- trade off