Author:
Dagher Gaby G.,Fung Benjamin C. M.,Mohammed Noman,Clark Jeremy
Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Hardware and Architecture,Human-Computer Interaction,Information Systems,Software
Reference65 articles.
1. Agrawal R, Kiernan J, Srikant R, Xu Y (2004) Order preserving encryption for numeric data. In: Proceedings of the ACM SIGMOD international conference on management of data (SIGMOD), pp 563–574
2. Bache K, Lichman M (2013) UCI machine learning repository. School of Information and Computer Sciences, University of California, Irvine
3. Barbaro M, Zeller TJ (2006) A face is exposed for AOL searcher no. 4417749
4. Barouti S, Aljumah F, Alhadidi D, Debbabi M (2014) Secure and privacy-preserving querying of personal health records in the cloud. In: Data and applications security and privacy XXVIII (LNCS), vol 8566, pp 82–97
5. Bayer R, McCreight E (1970) Organization and maintenance of large ordered indices. In: Proceedings of the ACM SIGFIDET workshop on data description, access and control, pp 107–141
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献