Login / Signup
Generalized external interaction with tamper-resistant hardware with bounded information leakage.
Xiangyao Yu
Christopher W. Fletcher
Ling Ren
Marten van Dijk
Srinivas Devadas
Published in:
CCSW (2013)
Keyphrases
</>
information leakage
low cost
personal information
image processing
social media
user interaction
secret information
data collection
data integration
data access