Author of the publication

Secure principal component analysis in multiple distributed nodes.

, , , , and . Secur. Commun. Networks, 9 (14): 2348-2358 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Publishing Time-Series Data under Preservation of Privacy and Distance Orders., , , and . DEXA (2), volume 6262 of Lecture Notes in Computer Science, page 17-31. Springer, (2010)An Envelope-Based Approach to Rotation-Invariant Boundary Image Matching., , and . DaWaK, volume 6862 of Lecture Notes in Computer Science, page 382-393. Springer, (2011)Efficient 2-Step Protocol and Its Discriminative Feature Selections in Secure Similar Document Detection., , , and . CoRR, (2015)Secure principal component analysis in multiple distributed nodes., , , , and . Secur. Commun. Networks, 9 (14): 2348-2358 (2016)Efficient Two-Step Protocol and Its Discriminative Feature Selections in Secure Similar Document Detection., , , , , and . Secur. Commun. Networks, (2017)Envelope-based boundary image matching for smart devices under arbitrary rotations., , , and . Multim. Syst., 21 (1): 29-47 (2015)Fast Computation of Rotation-Invariant Distances for Image Time-Series Data., , and . ICHIT (1), volume 7425 of Lecture Notes in Computer Science, page 516-524. Springer, (2012)SAMSTAR: An Automatic Tool for Generating Star Schemas from an Entity-Relationship Diagram., , , , , , and . ER, volume 5231 of Lecture Notes in Computer Science, page 522-523. Springer, (2008)Are You a Compatible User? - Compatibility of a Microblog User with a News Article., and . WorldCIST (3), volume 571 of Advances in Intelligent Systems and Computing, page 193-204. Springer, (2017)