• caglararli@hotmail.com
  • 05386281520

How privacy schemes can be evaluated?

Çağlar Arlı      -    42 Views

How privacy schemes can be evaluated?

I'm researching a privacy-oriented traffic extraction scheme, based on homomorphic encryption and several other technologies.

I'm having trouble how to evaluate the scheme according to the goal of the project (privacy and security).

How this phase is done in research?