Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Data privacy")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 649

  • Page / 26
Export

Selection :

  • and

Improved efficiency for private stable matchingFRANKLIN, Matthew; GONDREE, Mark; MOHASSEL, Payman et al.Lecture notes in computer science. 2006, pp 163-177, issn 0302-9743, isbn 978-3-540-69327-7, 1Vol, 15 p.Conference Paper

Privacy preservation for data cubesSUNG, Sam; YAO LIU; NG, Peter et al.International Conference on data engineering. 2004, isbn 0-7695-2065-0, 1Vol, p. 826Conference Paper

Privacy-preserving set operationsKISSNER, Lea; SONG, Dawn.Lecture notes in computer science. 2005, pp 241-257, issn 0302-9743, isbn 3-540-28114-2, 1Vol, 17 p.Conference Paper

A Firm Foundation for Private Data AnalysisDWORK, Cynthia.Communications of the ACM. 2011, Vol 54, Num 1, pp 86-95, issn 0001-0782, 10 p.Article

MANAGING HEALTHCARE THROUGH SOCIAL NETWORKSDOMINGO, Mari Carmen.Computer (Long Beach, CA). 2010, Vol 43, Num 7, pp 20-25, issn 0018-9162, 6 p.Article

Better Bug Reporting With Better PrivacyCASTRO, Miguel; COSTA, Manuel; MARTIN, Jean-Philippe et al.Operating systems review. 2008, Vol 42, Num 2, pp 319-328, issn 0163-5980, 10 p.Conference Paper

Regulatory ontologies: An Intellectual Property Rights approachDELGADO, Jaime; GALLEGO, Isabel; LLORENTE, Silvia et al.Lecture notes in computer science. 2003, pp 621-634, issn 0302-9743, isbn 3-540-20494-6, 14 p.Conference Paper

Privacy and Data SecurityGAFF, Brian M; SMEDINGHOFF, Thomas J; SOR, Socheth et al.Computer (Long Beach, CA). 2012, Vol 45, Num 3, pp 8-10, issn 0018-9162, 3 p.Article

Survey on methods for tabular data protection in ARGUSGIESSING, Sarah.Lecture notes in computer science. 2004, pp 1-13, issn 0302-9743, isbn 3-540-22118-2, 13 p.Conference Paper

The case for privacyCORBY, Michael J.Information systems security. 2002, Vol 11, Num 2, pp 9-14, issn 1065-898XArticle

A survey on security issues in service delivery models of cloud computingSUBASHINI, S; KAVITHA, V.Journal of network and computer applications. 2011, Vol 34, Num 1, pp 1-11, issn 1084-8045, 11 p.Article

Secure Collaboratiue Supply-Chain Management : Security and Privacy in an Online WorldKERSCHBAUM, Florian; SCHROPFER, Axel; ZILLI, Antonio et al.Computer (Long Beach, CA). 2011, Vol 44, Num 9, pp 38-43, issn 0018-9162, 6 p.Article

Disclosure risk in dynamic two-dimensional contingency tables (Extended abstract)HAIBING LU; YINGJIU LI; XINTAO WU et al.Lecture notes in computer science. 2006, pp 349-352, issn 0302-9743, isbn 978-3-540-68962-1, 1Vol, 4 p.Conference Paper

Combinations of SDC methods for microdata protectionOGANIAN, Anna; KARR, Alan F.Lecture notes in computer science. 2006, pp 102-113, issn 0302-9743, isbn 3-540-49330-1, 1Vol, 12 p.Conference Paper

Why swap when you can shuffle? A comparison of the proximity swap and data shuffle for numeric dataMURALIDHAR, Krish; SARATHY, Rathindra; DANDEKAR, Ramesh et al.Lecture notes in computer science. 2006, pp 164-176, issn 0302-9743, isbn 3-540-49330-1, 1Vol, 13 p.Conference Paper

Individual risk estimation in μ-argus: A reviewFRANCONI, Luisa; POLETTINI, Silvia.Lecture notes in computer science. 2004, pp 262-272, issn 0302-9743, isbn 3-540-22118-2, 11 p.Conference Paper

Towards a privacy audit programmes comparison frameworkKONSTANTINA, Kabouraki; STEFANOS, Gritzalis; KONSTANTINOS, Moulinos et al.Lecture notes in computer science. 2004, pp 328-331, issn 0302-9743, isbn 3-540-22916-7, 4 p.Conference Paper

A Privacy Preserving E-Payment SchemeANTONIOU, Giannakis; BATTEN, Lynn; NARAYAN, Shivaramakrishnan et al.Studies in computational intelligence. 2009, Vol Vol. 237, pp 197-202, isbn 978-3-642-03213-4 3-642-03213-3, 1Vol, 6 p.Conference Paper

Enhancing user privacy through data handling policiesARDAGNA, C. A; DE CAPITANI DI VIMERCATI, S; SAMARATI, P et al.Lecture notes in computer science. 2006, pp 224-236, issn 0302-9743, isbn 3-540-36796-9, 1Vol, 13 p.Conference Paper

Secure anonymization for incremental datasetsBYUN, Ji-Won; SOHN, Yonglak; BERTINO, Elisa et al.Lecture notes in computer science. 2006, pp 48-63, issn 0302-9743, isbn 3-540-38984-9, 1Vol, 16 p.Conference Paper

An oblivious transfer protocol with log-squared communicationLIPMAA, Helger.Lecture notes in computer science. 2005, pp 314-328, issn 0302-9743, isbn 3-540-29001-X, 1Vol, 15 p.Conference Paper

On the security of noise addition for privacy in statistical databasesDOMINGO-FERRER, Josep; SEBE, Francesc; CASTELLA-ROCA, Jordi et al.Lecture notes in computer science. 2004, pp 149-161, issn 0302-9743, isbn 3-540-22118-2, 13 p.Conference Paper

Data swapping: Variations on a theme by Dalenius and ReissFIENBERG, Stephen E; MCINTYRE, Julie.Lecture notes in computer science. 2004, pp 14-29, issn 0302-9743, isbn 3-540-22118-2, 16 p.Conference Paper

Efficient protocols for privacy preserving matching against distributed datasetsYINGPENG SANG; HONG SHEN; YASUO TAN et al.Lecture notes in computer science. 2006, pp 210-227, issn 0302-9743, isbn 3-540-49496-0, 18 p.Conference Paper

On the rôle of abstract non-interference in language-based securityMASTROENI, Isabella.Lecture notes in computer science. 2005, pp 418-433, issn 0302-9743, isbn 3-540-29735-9, 1Vol, 16 p.Conference Paper

  • Page / 26