Security with Privacy-Opportunities and Challenges
暂无分享,去创建一个
[1] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2000, Journal of Cryptology.
[2] Elisa Bertino,et al. Data Protection from Insider Threats , 2012, Data Protection from Insider Threats.
[3] Elisa Bertino,et al. GEO-RBAC: a spatially aware RBAC , 2005, SACMAT '05.
[4] Chris Clifton,et al. Privacy-Preserving Data Mining , 2006, Encyclopedia of Database Systems.
[5] Elisa Bertino,et al. Privacy Preserving Biometrics-Based and User Centric Authentication Protocol , 2014, NSS.
[6] Elisa Bertino,et al. Efficient privacy-aware record integration , 2013, EDBT '13.
[7] Elisa Bertino,et al. Privacy preserving schema and data matching , 2007, SIGMOD '07.
[8] Dongxi Liu,et al. Privacy of outsourced k-means clustering , 2014, AsiaCCS.
[9] Kartik Nayak,et al. Oblivious Data Structures , 2014, IACR Cryptol. ePrint Arch..
[10] Elisa Bertino,et al. Efficient k -Anonymization Using Clustering Techniques , 2007, DASFAA.