Hardware-assisted credential management scheme for preventing private data analysis from cloning attacks.
Jongwon ChoiGeonbae NaJeong Hyun YiPublished in: Multim. Tools Appl. (2016)
Keyphrases
- data analysis
- data processing
- access control
- low cost
- protection schemes
- management system
- chosen plaintext
- vlsi implementation
- hardware and software
- ibm zenterprise
- protection scheme
- real time
- decision support
- security analysis
- countermeasures
- data acquisition
- security mechanisms
- computer systems
- data mining
- hardware implementation
- knowledge management
- image watermarking scheme
- data warehouse
- machine learning
- robust watermarking scheme