Author:
Esponda Fernando,Forrest Stephanie,Helman Paul
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Information Systems,Software
Reference57 articles.
1. Achlioptas, D., Gomes, C., Kautz, H., Selman, B.: Generating satisfiable problem instances. In: Proceedings of the 7th Conference on Artificial Intelligence (AAAI-00) and of the 12th Conference on Innovative Applications of Artificial Intelligence (IAAI-00), pp. 256–261. AAAI Press, Menlo Park (2000)
2. Adam N.R., Wortman J.C.: Security-control methods for statistical databases. ACM Comput. Surv. 21(4), 515–556 (1989)
3. Agrawal, D., Aggarwal, C.C.: On the design and quantification of privacy preserving data mining algorithms. In: Symposium on Principles of Database Systems, pp. 247–255 (2001)
4. Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Proceedings of the ACM SIGMOD Conference on Management of Data, pp. 439–450. ACM Press, New York (2000). http://citeseer.nj.nec.com/agrawal00privacypreserving.html
5. Benaloh, J.C., de Mare, M.: One-way accumulators: a decentralized alternative to digital signatures. In: Advances in Cryptology— EUROCRYPT ’93, pp. 274–285 (1994). http://citeseer.nj.nec.com/article/benaloh93oneway.html
Cited by
16 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献