Sign in

On the limits of provable anonymity.

Nethanel GelernterAmir Herzberg
Published in: WPES (2013)
Keyphrases
  • privacy protection
  • location privacy
  • ring signature scheme
  • neural network
  • computer vision
  • trusted third party
  • real time
  • social networks
  • search algorithm