![Interval tree / Binary tree / Data management / Computing / Data / Data privacy / Differential privacy / Internet privacy Interval tree / Binary tree / Data management / Computing / Data / Data privacy / Differential privacy / Internet privacy](https://www.pdfsearch.io/img/013bb90fe81e54e6d1219f9b2d338115.jpg)
| Document Date: 2012-01-09 04:42:56 Open Document File Size: 379,96 KBShare Result on Facebook
Company ESPN / Microsoft / / Facility University of Hong Kong / / IndustryTerm real-world applications / by-product / setup algorithm / summation protocol / smart grid operator / cloud server / smart sensing applications / electricity consumption / aggregation algorithm / decryption algorithm / realworld applications / cloud computing / healthcare providers / crypto-systems / / Organization UC Berkeley / University of Hong Kong / / Person Geom / / Position Prime Minister / market researcher / trusted dealer / trusted curator / / ProgrammingLanguage C / / Technology encryption / 4 4.1 Binary Protocol / cryptography / summation protocol / Binary Protocol / one-time setup algorithm / randomized protocol / 4.3 Binary Protocol / peer-to-peer / name Binary Protocol / setup algorithm / secret key / decryption algorithm / aggregation algorithm / /
SocialTag |