<--- Back to Details
First PageDocument Content
Computing / Client–server model / Peer-to-peer / Trusted Computing / Communications protocol / Secure two-party computation / Secure multi-party computation / Cryptographic protocols / Data / Information
Date: 2012-01-10 15:06:54
Computing
Client–server model
Peer-to-peer
Trusted Computing
Communications protocol
Secure two-party computation
Secure multi-party computation
Cryptographic protocols
Data
Information

Exploring Privacy in Location-based Services Using Cryptographic Protocols

Document is deleted from original location.
Use the Download Button below to download from the Web Archive.

Download Document from Web Archive

File Size: 906,47 KB