Author:
Karapiperis Dimitrios,Vatsalan Dinusha,Verykios Vassilios S.,Christen Peter
Publisher
Springer International Publishing
Reference36 articles.
1. OTS SA (2014).
http://www.ots.gr/
2. Adamic, L., Huberman, B.: Zipf’s law and the internet. Glottonmetrics 11, 143–150 (2002)
3. Aggarwal, C., Yu, P.: A general survey of privacy-preserving data mining models and algorithms. Adv. Datab. Sys. 34, 11–52 (2008)
4. Agrawal, R., Evfimievski, A., Srikant, R.: Information sharing across private databases. In: SIGMOD, San Diego, California, USA, pp. 86–97 (2003)
5. Aumann, Y., Lindell, Y.: Security against covert adversaries: Efficient protocols for realistic adversaries. J. of Cryptol. 23(2), 281–343 (2010)
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献