作者: Martin Luther , Roake Timothy
DOI:
关键词:
摘要: A technique includes converting a plurality of plaintext values to corresponding pseudonym values. The conversion performing encryption the provide second values; perturbing and controlling cause an ordering be represented in