Panel three: Implementation-what methods, if any, can be employed to promote the existing rules' attempts to protect private identifier information from internet access?

Ronald Leighton, Joe Cecil, Michel Ishakian, Edward Felten, Elizabeth Stong, Jay Safer, Robert Heinemann, Joseph Goldstein

Research output: Contribution to journalArticlepeer-review

2 Scopus citations

Fingerprint

Dive into the research topics of 'Panel three: Implementation-what methods, if any, can be employed to promote the existing rules' attempts to protect private identifier information from internet access?'. Together they form a unique fingerprint.

Computer Science

Keyphrases