Release Time:2025-10-31 Hits:
Date of Publication: 2025-10-25
Journal: ACM COMPUTING SURVEYS
Volume: 57
Issue: 12
ISSN: 0360-0300
Key Words: formal methods and theory of security; formal security models; Security and privacy
Prev One:Points of the local optimal privacy utility tradeoff
Next One:A Privacy-Preserving Hybrid Range Search Scheme over Encrypted Electronic Medical Data in IoT Systems