Panel three: Implementation-what methods, if any, can be employed to promote the existing rules' attempts to protect private identifier information from internet access?

  • Ronald Leighton
  • , Joe Cecil
  • , Michel Ishakian
  • , Edward Felten
  • , Elizabeth Stong
  • , Jay Safer
  • , Robert Heinemann
  • , Joseph Goldstein

Research output: Contribution to journalArticlepeer-review

2 Scopus citations

Fingerprint

Dive into the research topics of 'Panel three: Implementation-what methods, if any, can be employed to promote the existing rules' attempts to protect private identifier information from internet access?'. Together they form a unique fingerprint.

Computer Science

Keyphrases