cloud computing privacy preserving multi level security. extended quasi identifier partitioning l-diversity k-anonymity elliptic curve cryptography. decryption encryption cryptography
See more