作者: Kapali Viswanathan , Colin Boyd , Ed Dawson
DOI: 10.1007/10719994_11
关键词:
摘要: The process of selection is omnipresent in the real world and modeling this as a cryptologic protocol will enable cross use techniques among similar applications, which eventually lead to better understanding refinement these applications. We present proposal for specialised with anonymity security service. An area its application anonymous peer review, where no should know identity reviewer.