Stem deterr$ (all stems)
2 papers:
CIKM-2006-YangDB- Practical private data matching deterrent to spoofing attacks (YY, RHD, FB), pp. 852–853.
SAC-1994-RogersU #linear #using- A deterrent to linear system inferential attacks using a mediator (DSR, EAU), pp. 15–19.










