Article,

From privacy methods to a privacy toolbox: Evaluation shows that heuristics are complementary.

, and .
ACM Trans. Comput. Hum. Interact., 15 (2): 8:1-8:30 (2008)

Meta data

Tags

    Users

    Comments and Reviews