Search

Your search keyword '"Database privacy"' showing total 44 results

Search Constraints

Start Over You searched for: Descriptor "Database privacy" Remove constraint Descriptor: "Database privacy"
44 results on '"Database privacy"'

Search Results

1. Database Reconstruction Is Not So Easy and Is Different from Reidentification.

5. Exploiting Update Leakage in Searchable Symmetric Encryption

6. Multi-User Quantum Private Query Protocol.

7. Semi-Quantum Private Query Protocol Without Invoking the Measurement Capability of Classical User.

8. Data Anonymization

9. Framework for Efficient Search and Statistics Computation on Encrypted Cloud Data

10. Defining Privacy Based on Distributions of Privacy Breaches

11. Research Review on the Application of Homomorphic Encryption in Database Privacy Protection

12. Cryptography: Data Encryption, Decryption and Compression, Database Privacy and Security, Zero Knowledge of Proof

13. Multi-User Quantum Private Query Protocol

14. Not All Attributes are Created Equal: d X -Private Mechanisms for Linear Queries

15. A New Protocol for Quantum Private Query Against Joint-Measurement Attack

16. Relativistic quantum private database queries.

17. Privacy and Coordination: Computing on Databases with Endogenous Participation.

18. Limiting Disclosure by Hiding the Attribute

19. Mercurial Commitments with Applications to Zero-Knowledge Sets.

20. Local and global recoding methods for anonymizing set-valued data.

21. Ethics Across the Computer Science Curriculum: Privacy Modules in an Introductory Database Course.

22. Differentially Private Obfuscation of Facial Images

23. Secure query processing against encrypted XML data using Query-Aware Decryption

24. A fast perturbation algorithm using tree structure for privacy preserving utility mining

25. Composition Properties of Inferential Privacy for Time-Series Data

26. Recent progress in database privacy

27. k-Attribute-Anonymity is hard even for k=2

28. Data Access Layer: A Programming Paradigm on Cloud

29. A learning theory approach to noninteractive database privacy

30. Assessing database privacy using the area under the receiver-operator characteristic curve

31. Database privacy

32. Recent progress in database privacy

33. Enhance Biometric Database Privacy: Defining Privacy-Preserving Drawer Size Standard for the Setbase

34. Defining Privacy Based on Distributions of Privacy Breaches

35. Mirror Descent Based Database Privacy

36. An Efficient Distribution Sensitive Privacy for Real-Time Applications

37. Database Deductive Access Control

38. Towards a Common Notion of Privacy Leakage on Public Database

39. Quantification of Integrity

41. Ethics across the computer science curriculum: privacy modules in an introductory database course

42. Empirical Analysis of Database Privacy Using Twofold Integrals

43. Efficient Hidden Vector Encryption for Conjunctive Queries on Encrypted Data.

44. Towards a unified framework for efficient access methods and query operations in spatio-temporal databases.

Catalog

Books, media, physical & digital resources