Computing conspiracies [data integrity] | IEEE Conference Publication | IEEE Xplore