From post

Practical and Privacy-Preserving Policy Compliance for Outsourced Data.

, , , , , и . Financial Cryptography Workshops, том 8438 из Lecture Notes in Computer Science, стр. 181-194. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Application of Game-Theoretic Techniques to Cryptography., и . Advances In Computational Complexity Theory, том 13 из DIMACS Series in Discrete Mathematics and Theoretical Computer Science, стр. 99-118. DIMACS/AMS, (1990)Cryptographic Protection of Databases and Software., , и . Distributed Computing And Cryptography, том 2 из DIMACS Series in Discrete Mathematics and Theoretical Computer Science, стр. 161-172. DIMACS/AMS, (1989)Accountability and deterrence in online life., , , , и . WebSci, стр. 7:1-7:7. ACM, (2011)Strange Bedfellows: How and When to Work with Your Enemy (Transcript of Discussion).. Security Protocols Workshop, том 8809 из Lecture Notes in Computer Science, стр. 268-275. Springer, (2014)An Efficient Protocol for Unconditionally Secure Secret Key Exchange., и . SODA, стр. 475-483. ACM/SIAM, (1993)Guest Editorial: Special Issue on Computer and Communications Security., и . ACM Trans. Inf. Syst. Secur., 12 (2): 7:1-7:2 (2008)Privacy-Preserving Computation of Bayesian Networks on Vertically Partitioned Data., и . IEEE Trans. Knowl. Data Eng., 18 (9): 1253-1264 (2006)Obstacles to freedom and privacy by design.. CFP, стр. 97-100. ACM, (2000)DP-WHERE: Differentially private modeling of human mobility., , , , и . IEEE BigData, стр. 580-588. IEEE Computer Society, (2013)Privacy Tradeoffs: Myth or Reality? Panel., , , , и . Financial Cryptography, том 2357 из Lecture Notes in Computer Science, стр. 147-151. Springer, (2002)