1Kas
How privacy schemes can be evaluated?
I'm researching a privacy-oriented traffic extraction scheme, based on homomorphic encryption and several other technologies.
I'm having trouble how to evaluate the scheme according to the goal of the project (privacy and security).
How this phase is done in research?