Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Confidencialidad de Datos")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 152

  • Page / 7
Export

Selection :

  • and

Privacy and Data SecurityGAFF, Brian M; SMEDINGHOFF, Thomas J; SOR, Socheth et al.Computer (Long Beach, CA). 2012, Vol 45, Num 3, pp 8-10, issn 0018-9162, 3 p.Article

A Firm Foundation for Private Data AnalysisDWORK, Cynthia.Communications of the ACM. 2011, Vol 54, Num 1, pp 86-95, issn 0001-0782, 10 p.Article

MANAGING HEALTHCARE THROUGH SOCIAL NETWORKSDOMINGO, Mari Carmen.Computer (Long Beach, CA). 2010, Vol 43, Num 7, pp 20-25, issn 0018-9162, 6 p.Article

Secure Collaboratiue Supply-Chain Management : Security and Privacy in an Online WorldKERSCHBAUM, Florian; SCHROPFER, Axel; ZILLI, Antonio et al.Computer (Long Beach, CA). 2011, Vol 44, Num 9, pp 38-43, issn 0018-9162, 6 p.Article

A First Step towards Privacy Leakage Diagnosis and ProtectionKIYOMOTO, Shinsaku; TANAKA, Toshiaki.Security & management. International conferenceWorldComp'2011. 2011, pp 236-242, isbn 1-60132-196-1 1-60132-197-X 1-60132-198-8, 7 p.Conference Paper

Privacy Preserving Data Dissemination (P2D2): An Ontological ApproachWHEELER, A; DIKE, J; WINBURN, M et al.Artificial intelligence. International conferenceWorldComp'2010. 2010, pp 286-291, isbn 1-60132-146-5 1-60132-147-3 1-60132-148-1, 6 p.Conference Paper

Critical parameters for privacy preservation through anonymisation in social networksGUPTA, Preeti; SHARMA, Sanur; BHATNAGAR, Vishal et al.International journal of networking and virtual organisations. 2012, Vol 11, Num 2, pp 156-172, issn 1470-9503, 17 p.Article

Privacy-Preserving Collaborative Recommender SystemsZHAN, Justin; HSIEH, Chia-Lung; WANG, I-Cheng et al.IEEE transactions on systems, man and cybernetics. Part C, Applications and reviews. 2010, Vol 40, Num 4, pp 472-476, issn 1094-6977, 5 p.Article

Tamper-Proofing Based on Quadtree AlgorithmEL ZOUKA, Heshem A.Image processing, computer vision, & pattern recognition. International conferenceWorldComp'2010. 2010, pp 310-314, isbn 1-60132-152-X 1-60132-153-8 1-60132-154-6, 5 p.Conference Paper

Privacy-preserving hybrid collaborative filtering on cross distributed dataYAKUT, Ibrahim; POLAT, Huseyin.Knowledge and information systems (Print). 2012, Vol 30, Num 2, pp 405-433, issn 0219-1377, 29 p.Article

Dedicated hardware for RC5 cryptography and its implementationYOSHIKAWA, Masaya; SAKAUE, Koichi.Embedded systems & applications. International conferenceWorldComp'2011. 2011, pp 135-139, isbn 1-60132-178-3, 5 p.Conference Paper

The Knowledge Based Authentication AttacksTOWHIDI, Farnaz; ABDUL MANAF, Azizah; MOHD DAUD, Salwani et al.Security & management. International conferenceWorldComp'2011. 2011, pp 649-653, isbn 1-60132-196-1 1-60132-197-X 1-60132-198-8, 5 p.Conference Paper

Privacy-Preserving Network ForensicsAFANASYEV, Mikhail; KOHNO, Tadayoshi; MA, Justin et al.Communications of the ACM. 2011, Vol 54, Num 5, pp 78-87, issn 0001-0782, 10 p.Article

Challenge Based Learning in Cybersecurity EducationCHEUNG, Ronald S; COHEN, Joseph P; LO, Henry Z et al.Security & management. International conferenceWorldComp'2011. 2011, pp 524-529, isbn 1-60132-196-1 1-60132-197-X 1-60132-198-8, 6 p.Conference Paper

Transparent Anonymization: Thwarting Adversaries Who Know the AlgorithmXIAOKUI XIAO; YUFEI TAO; KOUDAS, Nick et al.ACM transactions on database systems. 2010, Vol 35, Num 2, issn 0362-5915, 8.1-8.48Article

Preserving Relation Privacy in Online Social Network Data : SECURITY PRATICY IN SOCIAL NETWORKSNA LI; NAN ZHANG; DAS, Sajal K et al.IEEE internet computing. 2011, Vol 15, Num 3, pp 35-42, issn 1089-7801, 8 p.Article

Efficient Hidden Vector Encryption for Conjunctive Queries on Encrypted DataJONG HWAN PARK.IEEE transactions on knowledge and data engineering. 2011, Vol 23, Num 10, pp 1483-1497, issn 1041-4347, 15 p.Article

A novel Threat Evaluation method for privacy-aware system in RFIDYUAN TIAN; BIAO SONG; HUH, Eui-Nam et al.International journal of ad hoc and ubiquitous computing (Print). 2011, Vol 8, Num 4, pp 230-240, issn 1743-8225, 11 p.Article

Differential Privacy via Wavelet TransformsXIAOKUI XIAO; GUOZHANG WANG; GEHRKE, Johannes et al.IEEE transactions on knowledge and data engineering. 2011, Vol 23, Num 8, pp 1200-1214, issn 1041-4347, 15 p.Conference Paper

Semi-ShuffledBF: Performance Improvement of a Privacy-Preserving Query Method for a DaaS Model Using a Bloom filterKANEKO, Shizuka; WTANABE, Chiemi; AMAGASA, Toshiyuki et al.Parallel and distributed processing techniques and applications. International conferenceWorldComp'2011. 2011, pp 769-774, isbn 1-60132-193-7 1-60132-194-5 1-60132-195-3, 6 p.Conference Paper

A RELIABLE ANTI-COUNTERFIETING TECHNIQUE USING LOSSLESS CODES, Ravishankar; HARIHARAN, Santosh; NAVEEN KUMAR, V et al.Image processing, computer vision, & pattern recognition. International conferenceWorldComp'2010. 2010, pp 222-226, isbn 1-60132-152-X 1-60132-153-8 1-60132-154-6, 5 p.Conference Paper

COAT: COnstraint-based anonymization of transactions : Context-Aware Data Mining (CADM)LOUKIDES, Grigorios; GKOULALAS-DIVANIS, Aris; MALIN, Bradley et al.Knowledge and information systems (Print). 2011, Vol 28, Num 2, pp 251-282, issn 0219-1377, 32 p.Article

Efficient VSS free of computational assumptionKUN PENG.Journal of parallel and distributed computing (Print). 2011, Vol 71, Num 12, pp 1592-1597, issn 0743-7315, 6 p.Article

Multifactor Identity Verification Using Aggregated Proof of Knowledge : Availability, reliability, and securityBHARGAV-SPANTZEL, Abhilasha; SQUICCIARINI, Anna Cinzia; RUI XUE et al.IEEE transactions on systems, man and cybernetics. Part C, Applications and reviews. 2010, Vol 40, Num 4, pp 372-383, issn 1094-6977, 12 p.Article

A Border-Based Approach for Hiding Fuzzy Weighted Sensitive ItemsetsDURGA TOSHNIWAL, A; MRIDULA VERMA, B.Data mining. International conferenceWorldComp'2010. 2010, pp 301-307, isbn 1-60132-138-4, 7 p.Conference Paper

  • Page / 7