Login / Signup
Embedding renewable cryptographic keys into noisy data.
Ileana Buhan
Jeroen Doumen
Pieter H. Hartel
Qiang Tang
Raymond N. J. Veldhuis
Published in:
Int. J. Inf. Sec. (2010)
Keyphrases
</>
noisy data
hash functions
noise tolerant
smart card
high dimensional
learning from noisy data
missing data
secret key
noise free
vector space
intrinsic dimensionality
input data
wireless sensor networks
training data
data mining
watermarking algorithm
key management
security protocols
digital signature
security properties
neural network