Login / Signup
Private Yoking Proofs: Attacks, Models and New Provable Constructions.
Jens Hermans
Roel Peeters
Published in:
RFIDSec (2012)
Keyphrases
</>
countermeasures
probabilistic model
data sets
decision trees
case study
digital images
parameter estimation
privacy preserving
complex systems
statistical model
statistical models
classification models
watermarking scheme
accurate models
security risks