Login / Signup
Anonymity without 'Cryptography'.
Dahlia Malkhi
Elan Pavlov
Published in:
Financial Cryptography (2001)
Keyphrases
</>
cellular automata
information security
privacy protection
location privacy
encryption algorithms
payment scheme
neural network
data publishing
individual privacy
ring signature scheme
real time
security properties
trusted third party