-
1
Privacy preserving algorithm based on trajectory location and shape similarity
Published 2015-02-01Subjects: Get full text
Article -
2
Research on Sensitive Data Protection Technology on Cloud Computing
Published 2014-11-01Subjects: Get full text
Article