The basis of any solution must be a protocol that provides (usually without a third party) several functions:
Project: International Centre of Excellence for Research of Intelligent and Secure InformationCommunication Technologies and Systems
Topic: Research in cyber security, symmetric and asymmetric cryptography with limitations
Published: 2/2017
Implementer:
Documents:
Project: International Centre of Excellence for Research of Intelligent and Secure InformationCommunication Technologies and Systems
Topic: Privacy protection research
Published: 2/2017
Implementer:
Documents: