<--- Back to Details
First PageDocument Content
Cryptography / Public-key cryptography / Computer network security / ID-based encryption / Identity-based cryptography / Internet privacy / Computer security / Privacy / Information technology audit
Date: 2018-10-23 14:58:02
Cryptography
Public-key cryptography
Computer network security
ID-based encryption
Identity-based cryptography
Internet privacy
Computer security
Privacy
Information technology audit

The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion Sarah Meiklejohn∗ UC San Diego Keaton Mowery†

Add to Reading List

Source URL: smeiklej.com

Download Document from Source Website

File Size: 676,54 KB

Share Document on Facebook

Similar Documents

Information Technology – Audit 25 CFRToolkit Version	
  1.0	
   NIGC	
  Compliance	
  Division	
  

Information Technology – Audit 25 CFRToolkit Version  1.0   NIGC  Compliance  Division  

DocID: 1vrz9 - View Document

Information Technology Common Audit Issues

Information Technology Common Audit Issues

DocID: 1uVnv - View Document

EICC Validated Audit Process (VAP) VAP Operations Manual Revision 5.1 – January 2016 Information and communication technology companies working through the Electronics Industry Citizenship Coalition (EICC) www.eiccoali

EICC Validated Audit Process (VAP) VAP Operations Manual Revision 5.1 – January 2016 Information and communication technology companies working through the Electronics Industry Citizenship Coalition (EICC) www.eiccoali

DocID: 1rI76 - View Document

GOVERNMENT FINANCE OFFICERS ASSOCIATION (GFOA) RESEARCH AND CONSULTING CENTER Whitman County, Washington September 2015

GOVERNMENT FINANCE OFFICERS ASSOCIATION (GFOA) RESEARCH AND CONSULTING CENTER Whitman County, Washington September 2015

DocID: 1rqqV - View Document

Microsoft PowerPoint - InfoEthics and Grey Literature - poster - Oct13.pptx

Microsoft PowerPoint - InfoEthics and Grey Literature - poster - Oct13.pptx

DocID: 1rnPw - View Document