Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Data privacy")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 443

  • Page / 18
Export

Selection :

  • and

Privacy-preserving set operationsKISSNER, Lea; SONG, Dawn.Lecture notes in computer science. 2005, pp 241-257, issn 0302-9743, isbn 3-540-28114-2, 1Vol, 17 p.Conference Paper

A Firm Foundation for Private Data AnalysisDWORK, Cynthia.Communications of the ACM. 2011, Vol 54, Num 1, pp 86-95, issn 0001-0782, 10 p.Article

MANAGING HEALTHCARE THROUGH SOCIAL NETWORKSDOMINGO, Mari Carmen.Computer (Long Beach, CA). 2010, Vol 43, Num 7, pp 20-25, issn 0018-9162, 6 p.Article

Better Bug Reporting With Better PrivacyCASTRO, Miguel; COSTA, Manuel; MARTIN, Jean-Philippe et al.Operating systems review. 2008, Vol 42, Num 2, pp 319-328, issn 0163-5980, 10 p.Conference Paper

Regulatory ontologies: An Intellectual Property Rights approachDELGADO, Jaime; GALLEGO, Isabel; LLORENTE, Silvia et al.Lecture notes in computer science. 2003, pp 621-634, issn 0302-9743, isbn 3-540-20494-6, 14 p.Conference Paper

Survey on methods for tabular data protection in ARGUSGIESSING, Sarah.Lecture notes in computer science. 2004, pp 1-13, issn 0302-9743, isbn 3-540-22118-2, 13 p.Conference Paper

The case for privacyCORBY, Michael J.Information systems security. 2002, Vol 11, Num 2, pp 9-14, issn 1065-898XArticle

A survey on security issues in service delivery models of cloud computingSUBASHINI, S; KAVITHA, V.Journal of network and computer applications. 2011, Vol 34, Num 1, pp 1-11, issn 1084-8045, 11 p.Article

A Privacy Preserving E-Payment SchemeANTONIOU, Giannakis; BATTEN, Lynn; NARAYAN, Shivaramakrishnan et al.Studies in computational intelligence. 2009, Vol Vol. 237, pp 197-202, isbn 978-3-642-03213-4 3-642-03213-3, 1Vol, 6 p.Conference Paper

Enhancing user privacy through data handling policiesARDAGNA, C. A; DE CAPITANI DI VIMERCATI, S; SAMARATI, P et al.Lecture notes in computer science. 2006, pp 224-236, issn 0302-9743, isbn 3-540-36796-9, 1Vol, 13 p.Conference Paper

Secure anonymization for incremental datasetsBYUN, Ji-Won; SOHN, Yonglak; BERTINO, Elisa et al.Lecture notes in computer science. 2006, pp 48-63, issn 0302-9743, isbn 3-540-38984-9, 1Vol, 16 p.Conference Paper

An oblivious transfer protocol with log-squared communicationLIPMAA, Helger.Lecture notes in computer science. 2005, pp 314-328, issn 0302-9743, isbn 3-540-29001-X, 1Vol, 15 p.Conference Paper

Efficient protocols for privacy preserving matching against distributed datasetsYINGPENG SANG; HONG SHEN; YASUO TAN et al.Lecture notes in computer science. 2006, pp 210-227, issn 0302-9743, isbn 3-540-49496-0, 18 p.Conference Paper

On the rôle of abstract non-interference in language-based securityMASTROENI, Isabella.Lecture notes in computer science. 2005, pp 418-433, issn 0302-9743, isbn 3-540-29735-9, 1Vol, 16 p.Conference Paper

Supporting field study with personalized project spaces in a geographical digital libraryLIM, Ee-Peng; AIXIN SUN; ZEHUA LIU et al.Lecture notes in computer science. 2004, pp 553-562, issn 0302-9743, isbn 3-540-24030-6, 10 p.Conference Paper

On honesty in sovereign information sharingAGRAWAL, Rakesh; TERZI, Evimaria.Lecture notes in computer science. 2006, pp 240-256, issn 0302-9743, isbn 3-540-32960-9, 1Vol, 17 p.Conference Paper

Anonymous hierarchical identity-based encryption (without random oracles)BOYEN, Xavier; WATERS, Brent.Lecture notes in computer science. 2006, pp 290-307, issn 0302-9743, isbn 3-540-37432-9, 1Vol, 18 p.Conference Paper

Information sharing and collaboration policies within government agenciesATABAKHSH, Homa; LARSON, Catherine; PETERSEN, Tim et al.Lecture notes in computer science. 2004, pp 467-475, issn 0302-9743, isbn 3-540-22125-5, 9 p.Conference Paper

Sécurité d'Internet = Security over the InternetLAURENT-MAKNAVICIUS, Maryline.Techniques de l'ingénieur. Sécurité des systèmes d'information. 2001, Vol SI1, Num H2268, pp H2268.1-H2268.15Article

KD3 scheme for privacy preserving data miningPENG ZHANG; YUNHAI TONG; SHIWEI TANG et al.Lecture notes in computer science. 2006, pp 659-661, issn 0302-9743, isbn 3-540-34478-0, 1Vol, 3 p.Conference Paper

New proofs for NMAC and HMAC : Security without collision-resistanceBELLARE, Mihir.Lecture notes in computer science. 2006, pp 602-619, issn 0302-9743, isbn 3-540-37432-9, 1Vol, 18 p.Conference Paper

Privacy-preserving graph algorithms in the semi-honest modelBRICKELL, Justin; SHMATIKOV, Vitaly.Lecture notes in computer science. 2005, pp 236-252, issn 0302-9743, isbn 3-540-30684-6, 1Vol, 17 p.Conference Paper

On the security of cryptosystems with all-or-nothing transformZHANG, Rui; HANAOKA, Goichiro; IMAI, Hideki et al.Lecture notes in computer science. 2004, pp 76-90, issn 0302-9743, isbn 3-540-22217-0, 15 p.Conference Paper

How to sanitize dataBISHOP, Matt; BHUMIRATANA, Bhume; CRAWFORD, Rick et al.IEEE international workshops on enabling technologies. 2004, pp 217-222, isbn 0-7695-2183-5, 1Vol, 6 p.Conference Paper

SeDas: A Self-Destructing Data System Based on Active Storage FrameworkLINGFANG ZENG; SHIBIN CHEN; QINGSONG WEI et al.IEEE transactions on magnetics. 2013, Vol 49, Num 6, pp 2548-2554, issn 0018-9464, 7 p., 1Conference Paper

  • Page / 18