Back to Results
First PageMeta Content
Computing / Client–server model / Peer-to-peer / Trusted Computing / Communications protocol / Secure two-party computation / Secure multi-party computation / Cryptographic protocols / Data / Information


Exploring Privacy in Location-based Services Using Cryptographic Protocols
Add to Reading List

Document Date: 2012-01-10 15:06:54


Open Document

File Size: 906,47 KB

Share Result on Facebook
UPDATE