<--- Back to Details
First PageDocument Content
Cryptography / Public-key cryptography / Computer network security / ID-based encryption / Identity-based cryptography / Internet privacy / Computer security / Privacy / Information technology audit
Date: 2018-10-23 14:58:02
Cryptography
Public-key cryptography
Computer network security
ID-based encryption
Identity-based cryptography
Internet privacy
Computer security
Privacy
Information technology audit

The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion Sarah Meiklejohn∗ UC San Diego Keaton Mowery†

Add to Reading List

Source URL: smeiklej.com

Download Document from Source Website

File Size: 676,54 KB

Share Document on Facebook

Similar Documents