Login / Signup

Secure Processor Consistent with Both Foreign Software Protection and User Privacy Protection.

Mikio HashimotoHiroyoshi HarukiTakeshi Kawabata
Published in: Security Protocols Workshop (2004)
Keyphrases
  • user privacy
  • security level
  • data protection
  • previously mentioned
  • privacy preserving
  • malicious users
  • protection schemes
  • information systems
  • computer systems
  • user behavior
  • identity management