Hits:
Date of Publication:2025-10-25
Journal:ACM COMPUTING SURVEYS
Volume:57
Issue:12
ISSN No.:0360-0300
Key Words:formal methods and theory of security; formal security models; Security and privacy
Pre One:Points of the local optimal privacy utility tradeoff
Next One:A Privacy-Preserving Hybrid Range Search Scheme over Encrypted Electronic Medical Data in IoT Systems