Login / Signup
A game-theoretic approach to indistinguishability of winning objectives as user privacy.
Rindo Nakanishi
Yoshiaki Takata
Hiroyuki Seki
Published in:
CoRR (2023)
Keyphrases
</>
user privacy
privacy preserving
malicious users
identity management
location based services
privacy preservation
private information
data sets
privacy preserving data mining
data mining
encryption scheme