Author:
Erwig Andreas,Fischlin Marc,Hald Martin,Helm Dominik,Kiel Robert,Kübler Florian,Kümmerlin Michael,Laenge Jakob,Rohrbach Felix
Publisher
Springer International Publishing
Reference15 articles.
1. Arshad, M.U., Kundu, A., Bertino, E., Madhavan, K., Ghafoor, A.: Security of graph data: hashing schemes and definitions. In: Proceedings of the 4th ACM Conference on Data and Application Security and Privacy, CODASPY 2014, NY, USA, pp. 223–234 (2014).
http://doi.acm.org/10.1145/2557547.2557564
2. Lecture Notes in Computer Science;G Ateniese,2005
3. Bauer, D., Blough, D.M., Mohan, A.: Redactable signatures on data with dependencies and their application to personal health records. In: Proceedings of the 2009 ACM Workshop on Privacy in the Electronic Society, WPES 2009, Chicago, Illinois, USA, November 9, 2009, pp. 91–100. ACM (2009)
4. Brown, J., Ahamad, M., Ahmed, M., Blough, D.M., Kurc, T., Post, A., Saltz, J.: Redactable and auditable data access for bioinformatics research, pp. 21–25 (2013)
5. Brown, J., Blough, D.M.: Verifiable and redactable medical documents. In: American Medical Informatics Association Annual Symposium AMIA 2012, Chicago, Illinois, USA, November 3–7, 2012. AMIA (2012)
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献