Login / Signup
Run-Time Randomization to Mitigate Tampering.
Bertrand Anckaert
Mariusz H. Jakubowski
Ramarathnam Venkatesan
Koen De Bosschere
Published in:
IWSEC (2007)
Keyphrases
</>
digital images
privacy preserving
reverse engineering
privacy preserving association rule mining
database
e learning
neural network
real world
data mining
image processing
image compression
image authentication