Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Confidentialité donnée")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 431

  • Page / 18
Export

Selection :

  • and

Privacy-preserving set operationsKISSNER, Lea; SONG, Dawn.Lecture notes in computer science. 2005, pp 241-257, issn 0302-9743, isbn 3-540-28114-2, 1Vol, 17 p.Conference Paper

A Firm Foundation for Private Data AnalysisDWORK, Cynthia.Communications of the ACM. 2011, Vol 54, Num 1, pp 86-95, issn 0001-0782, 10 p.Article

MANAGING HEALTHCARE THROUGH SOCIAL NETWORKSDOMINGO, Mari Carmen.Computer (Long Beach, CA). 2010, Vol 43, Num 7, pp 20-25, issn 0018-9162, 6 p.Article

Better Bug Reporting With Better PrivacyCASTRO, Miguel; COSTA, Manuel; MARTIN, Jean-Philippe et al.Operating systems review. 2008, Vol 42, Num 2, pp 319-328, issn 0163-5980, 10 p.Conference Paper

Regulatory ontologies: An Intellectual Property Rights approachDELGADO, Jaime; GALLEGO, Isabel; LLORENTE, Silvia et al.Lecture notes in computer science. 2003, pp 621-634, issn 0302-9743, isbn 3-540-20494-6, 14 p.Conference Paper

The case for privacyCORBY, Michael J.Information systems security. 2002, Vol 11, Num 2, pp 9-14, issn 1065-898XArticle

Survey on methods for tabular data protection in ARGUSGIESSING, Sarah.Lecture notes in computer science. 2004, pp 1-13, issn 0302-9743, isbn 3-540-22118-2, 13 p.Conference Paper

Efficient protocols for privacy preserving matching against distributed datasetsYINGPENG SANG; HONG SHEN; YASUO TAN et al.Lecture notes in computer science. 2006, pp 210-227, issn 0302-9743, isbn 3-540-49496-0, 18 p.Conference Paper

On the rôle of abstract non-interference in language-based securityMASTROENI, Isabella.Lecture notes in computer science. 2005, pp 418-433, issn 0302-9743, isbn 3-540-29735-9, 1Vol, 16 p.Conference Paper

Supporting field study with personalized project spaces in a geographical digital libraryLIM, Ee-Peng; AIXIN SUN; ZEHUA LIU et al.Lecture notes in computer science. 2004, pp 553-562, issn 0302-9743, isbn 3-540-24030-6, 10 p.Conference Paper

A Privacy Preserving E-Payment SchemeANTONIOU, Giannakis; BATTEN, Lynn; NARAYAN, Shivaramakrishnan et al.Studies in computational intelligence. 2009, Vol Vol. 237, pp 197-202, isbn 978-3-642-03213-4 3-642-03213-3, 1Vol, 6 p.Conference Paper

Enhancing user privacy through data handling policiesARDAGNA, C. A; DE CAPITANI DI VIMERCATI, S; SAMARATI, P et al.Lecture notes in computer science. 2006, pp 224-236, issn 0302-9743, isbn 3-540-36796-9, 1Vol, 13 p.Conference Paper

Secure anonymization for incremental datasetsBYUN, Ji-Won; SOHN, Yonglak; BERTINO, Elisa et al.Lecture notes in computer science. 2006, pp 48-63, issn 0302-9743, isbn 3-540-38984-9, 1Vol, 16 p.Conference Paper

An oblivious transfer protocol with log-squared communicationLIPMAA, Helger.Lecture notes in computer science. 2005, pp 314-328, issn 0302-9743, isbn 3-540-29001-X, 1Vol, 15 p.Conference Paper

KD3 scheme for privacy preserving data miningPENG ZHANG; YUNHAI TONG; SHIWEI TANG et al.Lecture notes in computer science. 2006, pp 659-661, issn 0302-9743, isbn 3-540-34478-0, 1Vol, 3 p.Conference Paper

New proofs for NMAC and HMAC : Security without collision-resistanceBELLARE, Mihir.Lecture notes in computer science. 2006, pp 602-619, issn 0302-9743, isbn 3-540-37432-9, 1Vol, 18 p.Conference Paper

Privacy-preserving graph algorithms in the semi-honest modelBRICKELL, Justin; SHMATIKOV, Vitaly.Lecture notes in computer science. 2005, pp 236-252, issn 0302-9743, isbn 3-540-30684-6, 1Vol, 17 p.Conference Paper

On the security of cryptosystems with all-or-nothing transformZHANG, Rui; HANAOKA, Goichiro; IMAI, Hideki et al.Lecture notes in computer science. 2004, pp 76-90, issn 0302-9743, isbn 3-540-22217-0, 15 p.Conference Paper

How to sanitize dataBISHOP, Matt; BHUMIRATANA, Bhume; CRAWFORD, Rick et al.IEEE international workshops on enabling technologies. 2004, pp 217-222, isbn 0-7695-2183-5, 1Vol, 6 p.Conference Paper

Towards privacy preserving distributed association rule miningMAFRUZ ZAMAN ASHRAFI; TANIAR, David; SMITH, Kate et al.Lecture notes in computer science. 2003, pp 279-289, issn 0302-9743, isbn 3-540-20745-7, 11 p.Conference Paper

On honesty in sovereign information sharingAGRAWAL, Rakesh; TERZI, Evimaria.Lecture notes in computer science. 2006, pp 240-256, issn 0302-9743, isbn 3-540-32960-9, 1Vol, 17 p.Conference Paper

Anonymous hierarchical identity-based encryption (without random oracles)BOYEN, Xavier; WATERS, Brent.Lecture notes in computer science. 2006, pp 290-307, issn 0302-9743, isbn 3-540-37432-9, 1Vol, 18 p.Conference Paper

Information sharing and collaboration policies within government agenciesATABAKHSH, Homa; LARSON, Catherine; PETERSEN, Tim et al.Lecture notes in computer science. 2004, pp 467-475, issn 0302-9743, isbn 3-540-22125-5, 9 p.Conference Paper

Decomposable algorithms for computing minimum spanning treeKHEDR, Ahmed; BHATNAGAR, Raj.Lecture notes in computer science. 2003, pp 33-44, issn 0302-9743, isbn 3-540-20745-7, 12 p.Conference Paper

Sécurité d'Internet = Security over the InternetLAURENT-MAKNAVICIUS, Maryline.Techniques de l'ingénieur. Sécurité des systèmes d'information. 2001, Vol SI1, Num H2268, pp H2268.1-H2268.15Article

  • Page / 18