Skip to content

On Leveraging GPUs for Security: discussing k-anonymity and pattern matching