Login / Signup
Protection Profiles for Remailer Mixes -Do the New Evaluation Criteria Help?
Kai Rannenberg
Giovanni Iachello
Published in:
ACSAC (2000)
Keyphrases
</>
evaluation criteria
evaluation process
evaluation methods
user profiles
fuzzy rules
information security
data protection
pattern recognition
privacy protection
data mining
learning algorithm
artificial intelligence
computer vision
feature selection
training data
critical infrastructure