Login / Signup
Architectural support for protecting user privacy on trusted processors.
Youtao Zhang
Jun Yang
Yongjing Lin
Lan Gao
Published in:
SIGARCH Comput. Archit. News (2005)
Keyphrases
</>
user privacy
end users
privacy preservation
data mining
privacy preserving
data sets
malicious users