Author:
Al Bouna Bechara,Clifton Chris,Malluhi Qutaibah
Publisher
Springer Berlin Heidelberg
Reference23 articles.
1. Lecture Notes in Computer Science;D.J. Aldous,1996
2. Asuncion, A., Newman, D.J.: UCI machine learning repository (2007)
3. Burghardt, T., Böhm, K., Guttmann, A., Clifton, C.: Anonymous search histories featuring personalized advertisement - balancing privacy with economic interests. Transactions on Data Privacy 4(1), 31–50 (2011)
4. Ciriani, V., De Capitani Di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Combining fragmentation and encryption to protect privacy in data storage. ACM Trans. Inf. Syst. Secur. 13, 22:1–22:33 (2010)
5. Hacıgümüş, H., Iyer, B.R., Mehrotra, S.: Executing SQL over encrypted data in the database-service-provider model. In: Proc. ACM SIGMOD Intl. Conf. on Management of Data, Madison, WI, June 4-6, pp. 216–227 (2002)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献