Research Article
Remote Surveillance System without Privacy Leakage for Contacts in Infectious Disease
Algorithm 8
Location information decryption.
| Input: , , | | Output: (the total location information) | (1) | if contact is confirmed | (2) | , then send it to health center | (3) | for each at time i of the contact | (4) | | (5) | | (6) | | (7) | end for | (8) | return | (9) | end if |
|