Login / Signup

How to Protect Yourself without Perfect Shredding.

Ran CanettiDror EigerShafi GoldwasserDah-Yoh Lim
Published in: ICALP (2) (2008)
Keyphrases
  • machine learning
  • xml queries
  • digital libraries
  • data encryption
  • social networks
  • evolutionary algorithm
  • data management
  • privacy protection