Release Time:2025-10-31 Hits:
Date of Publication: 2025-10-24
Journal: ACM COMPUTING SURVEYS
Volume: 57
Issue: 12
ISSN: 0360-0300
Key Words: formal methods and theory of security; formal security models; Security and privacy
Prev One:LiDAR-Track: Multi-Person Positioning and Tracking Using LiDAR
Next One:Points of the local optimal privacy utility tradeoff