Application and analysis of private matching schemes based on commutative cryptosystems.
Citation
Kwecka, Z., Buchanan, W. J. & Spiers, D. A. (2008). Application and analysis of private matching schemes based on commutative cryptosystems
Authors
Keywords
Commutative cryptography; data acquisition; privacy enhancing technologies; data mining; private matching; digital footprint;
Monthly Views: