Legally Authorized and Unauthorized Digital Evidence.
Hiroshi YoshiuraKunihiko MiyazakiShinji ItohKazuo TakaragiRyôichi SasakiPublished in: Security Protocols Workshop (2002)
Keyphrases
- sensitive information
- sensitive data
- privacy preserving
- third party
- data storage
- smart card
- information security
- privacy protection
- secret information
- unauthorized access
- data protection
- data sharing
- digital images
- probabilistic model
- information retrieval
- original data
- multimedia content
- image quality
- information technology
- digital libraries
- three dimensional
- databases