Login / Signup
Secure Processor Consistent with Both Foreign Software Protection and User Privacy Protection.
Mikio Hashimoto
Hiroyoshi Haruki
Takeshi Kawabata
Published in:
Security Protocols Workshop (2004)
Keyphrases
</>
user privacy
security level
data protection
previously mentioned
privacy preserving
malicious users
protection schemes
information systems
computer systems
user behavior
identity management