• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Generalized external interaction with tamper-resistant hardware with bounded information leakage.

Xiangyao YuChristopher W. FletcherLing RenMarten van DijkSrinivas Devadas
Published in: CCSW (2013)
Keyphrases
  • information leakage
  • low cost
  • personal information
  • image processing
  • social media
  • user interaction
  • secret information
  • data collection
  • data integration
  • data access