Login / Signup
Selective Location Blinding Using Hash Chains (Transcript of Discussion).
Sjouke Mauw
Published in:
Security Protocols Workshop (2011)
Keyphrases
</>
hash functions
data structure
location information
data sets
information retrieval
information systems
high dimensional
nearest neighbor
b tree
automatically generated
physical location
secret information