Encrypted? Randomised? Compromised? (When Cryptographically Secured Data is Not Secure).
Mike BondJolyon ClulowPublished in: Cryptographic Algorithms and their Uses (2004)
Keyphrases
- data sets
- data analysis
- data collection
- data sources
- complex data
- original data
- data distribution
- statistical analysis
- image data
- raw data
- end users
- wireless sensor networks
- prior knowledge
- high dimensional data
- data mining
- data quality
- probability distribution
- knowledge discovery
- small number
- information systems
- data objects
- database