Login / Signup
Secure Processor Consistent with Both Foreign Software Protection and User Privacy Protection (Transcript of Discussion).
Mikio Hashimoto
Published in:
Security Protocols Workshop (2004)
Keyphrases
</>
user privacy
data protection
privacy protection
previously mentioned
privacy preserving
security level
private information
user interface
database management systems
operating system
information security
protection schemes