Author of the publication

Signaling Potential Adverse Drug Reactions from Administrative Health Databases.

, , , , , and . IEEE Trans. Knowl. Data Eng., 22 (6): 839-853 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Secret Sharing Without a Mutually Trusted Authority (Extended Abstract)., , and . EUROCRYPT, volume 921 of Lecture Notes in Computer Science, page 183-193. Springer, (1995)Comparison of Two Remote Access Systems Recently Developed and Implemented in Australia., , and . Privacy in Statistical Databases, volume 8744 of Lecture Notes in Computer Science, page 299-311. Springer, (2014)Providing Anonymity in Unconditionally Secure Secret Sharing Schemes., , and . Des. Codes Cryptogr., 28 (3): 227-245 (2003)Multisecret Threshold Schemes., , and . CRYPTO, volume 773 of Lecture Notes in Computer Science, page 126-135. Springer, (1993)Disclosure risk reduction for generalized linear model output in a remote analysis system., and . Data Knowl. Eng., (2017)A Bootstrap Mechanism for Response Masking in Remote Analysis Systems., , and . Decis. Sci., 46 (6): 1199-1226 (2015)Applications of finite geometries to information security.. Australas. J Comb., (1993)Mutually Trusted Authority-Free Secret Sharing Schemes., , and . J. Cryptol., 10 (4): 261-289 (1997)Applicability of Regression-Tree-Based Synthetic Data Methods for Business Data., , and . ICDM Workshops, page 651-658. IEEE Computer Society, (2011)Role and Expression of Consent in Web Services., and . ICWS, page 382-388. CSREA Press, (2003)