Stem deterr$ (all stems)
2 papers:
- CIKM-2006-YangDB
- Practical private data matching deterrent to spoofing attacks (YY, RHD, FB), pp. 852–853.
- SAC-1994-RogersU #linear #using
- A deterrent to linear system inferential attacks using a mediator (DSR, EAU), pp. 15–19.