Login / Signup
How to Protect Yourself without Perfect Shredding.
Ran Canetti
Dror Eiger
Shafi Goldwasser
Dah-Yoh Lim
Published in:
ICALP (2) (2008)
Keyphrases
</>
machine learning
xml queries
digital libraries
data encryption
social networks
evolutionary algorithm
data management
privacy protection