Author:
Mouratidis Kyriakos,Sacharidis Dimitris,Pang HweeHwa
Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Information Systems
Reference33 articles.
1. Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: SIGMOD Conference, pp. 439–450 (2000)
2. Beckmann, N., Kriegel, H.P., Schneider, R., Seeger, B.: The r*-tree: an efficient and robust access method for points and rectangles. In: SIGMOD Conference, pp. 322–331 (1990)
3. de Berg M., van Kreveld M., Overmars M., Schwarzkopf O.: Computational Geometry: Algorithms and Applications, 2nd edn. Springer, Berlin (2000)
4. Bertino, E., Carminati, B., Ferrari, E.: Merkle tree authentication in uddi registries. Int. J. Web Service Res. 1(2) (2004)
5. Bertino E., Carminati B., Ferrari E., Thuraisingham B.M., Gupta A: Selective and authentic third-party distribution of XML documents. IEEE TKDE 16(10), 1263–1278 (2004)
Cited by
42 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献